default search action
BibTeX records: Joe Kilian
@incollection{DBLP:books/acm/19/Ben-OrGKW19, author = {Michael Ben{-}Or and Shafi Goldwasser and Joe Kilian and Avi Wigderson}, editor = {Oded Goldreich}, title = {Multi-prover interactive proofs: how to remove intractability assumptions}, booktitle = {Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali}, pages = {373--410}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335741.3335758}, doi = {10.1145/3335741.3335758}, timestamp = {Tue, 05 Nov 2019 15:40:16 +0100}, biburl = {https://dblp.org/rec/books/acm/19/Ben-OrGKW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rsa/ArratiaGK16, author = {Richard Arratia and Skip Garibaldi and Joe Kilian}, title = {Asymptotic distribution for the birthday problem with multiple coincidences, via an embedding of the collision process}, journal = {Random Struct. Algorithms}, volume = {48}, number = {3}, pages = {480--502}, year = {2016}, url = {https://doi.org/10.1002/rsa.20591}, doi = {10.1002/RSA.20591}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rsa/ArratiaGK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KellerK08, author = {Jason Keller and Joe Kilian}, editor = {Josef Pieprzyk}, title = {A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5350}, pages = {198--215}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89255-7\_13}, doi = {10.1007/978-3-540-89255-7\_13}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KellerK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/CrepeauKS08, author = {Claude Cr{\'{e}}peau and Joe Kilian and George Savvides}, editor = {Reihaneh Safavi{-}Naini}, title = {Interactive Hashing: An Information Theoretic Tool (Invited Talk)}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {14--28}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_3}, doi = {10.1007/978-3-540-85093-9\_3}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/CrepeauKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KilianMSZ08, author = {Joe Kilian and Andr{\'{e}} Madeira and Martin J. Strauss and Xuan Zheng}, editor = {Ran Canetti}, title = {Fast Private Norm Estimation and Heavy Hitters}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {176--193}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_11}, doi = {10.1007/978-3-540-78524-8\_11}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/KilianMSZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cc/HarshaIKNV07, author = {Prahladh Harsha and Yuval Ishai and Joe Kilian and Kobbi Nissim and Srinivasan Venkatesh}, title = {Communication vs. Computation}, journal = {Comput. Complex.}, volume = {16}, number = {1}, pages = {1--33}, year = {2007}, url = {https://doi.org/10.1007/s00037-007-0224-y}, doi = {10.1007/S00037-007-0224-Y}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cc/HarshaIKNV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotos/BaligaKI07, author = {Arati Baliga and Joe Kilian and Liviu Iftode}, editor = {Galen C. Hunt}, title = {A Web Based Covert File System}, booktitle = {Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, May 7-9, 2005, San Diego, California, {USA}}, publisher = {{USENIX} Association}, year = {2007}, url = {http://www.usenix.org/events/hotos07/tech/full\_papers/baliga/baliga.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotos/BaligaKI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/BaligaK07, author = {Arati Baliga and Joe Kilian}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {On covert collaboration}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {25--34}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288874}, doi = {10.1145/1288869.1288874}, timestamp = {Mon, 22 Apr 2024 21:24:22 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/BaligaK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/combinatorica/KilianRP05, author = {Joe Kilian and Charles Rackoff and Erez Petrank}, title = {Lower Bounds For Concurrent Zero Knowledge*}, journal = {Comb.}, volume = {25}, number = {2}, pages = {217--249}, year = {2005}, url = {https://doi.org/10.1007/s00493-005-0014-6}, doi = {10.1007/S00493-005-0014-6}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/combinatorica/KilianRP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/FortnowKPW05, author = {Lance Fortnow and Joe Kilian and David M. Pennock and Michael P. Wellman}, title = {Betting Boolean-style: a framework for trading in securities based on logical formulas}, journal = {Decis. Support Syst.}, volume = {39}, number = {1}, pages = {87--104}, year = {2005}, url = {https://doi.org/10.1016/j.dss.2004.08.010}, doi = {10.1016/J.DSS.2004.08.010}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/FortnowKPW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HarnikKNRR05, author = {Danny Harnik and Joe Kilian and Moni Naor and Omer Reingold and Alon Rosen}, editor = {Ronald Cramer}, title = {On Robust Combiners for Oblivious Transfer and Other Primitives}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {96--113}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_6}, doi = {10.1007/11426639\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HarnikKNRR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2005, editor = {Joe Kilian}, title = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b106171}, doi = {10.1007/B106171}, isbn = {3-540-24573-1}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/HarshaIKNV04, author = {Prahladh Harsha and Yuval Ishai and Joe Kilian and Kobbi Nissim and Srinivasan Venkatesh}, editor = {Josep D{\'{\i}}az and Juhani Karhum{\"{a}}ki and Arto Lepist{\"{o}} and Donald Sannella}, title = {Communication Versus Computation}, booktitle = {Automata, Languages and Programming: 31st International Colloquium, {ICALP} 2004, Turku, Finland, July 12-16, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3142}, pages = {745--756}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27836-8\_63}, doi = {10.1007/978-3-540-27836-8\_63}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/HarshaIKNV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/ChazelleKRT04, author = {Bernard Chazelle and Joe Kilian and Ronitt Rubinfeld and Ayellet Tal}, editor = {J. Ian Munro}, title = {The Bloomier filter: an efficient data structure for static support lookup tables}, booktitle = {Proceedings of the Fifteenth Annual {ACM-SIAM} Symposium on Discrete Algorithms, {SODA} 2004, New Orleans, Louisiana, USA, January 11-14, 2004}, pages = {30--39}, publisher = {{SIAM}}, year = {2004}, url = {http://dl.acm.org/citation.cfm?id=982792.982797}, timestamp = {Fri, 07 Dec 2012 17:02:08 +0100}, biburl = {https://dblp.org/rec/conf/soda/ChazelleKRT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKNP03, author = {Yuval Ishai and Joe Kilian and Kobbi Nissim and Erez Petrank}, editor = {Dan Boneh}, title = {Extending Oblivious Transfers Efficiently}, booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2729}, pages = {145--161}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45146-4\_9}, doi = {10.1007/978-3-540-45146-4\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKNP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/MicaliRK03, author = {Silvio Micali and Michael O. Rabin and Joe Kilian}, title = {Zero-Knowledge Sets}, booktitle = {44th Symposium on Foundations of Computer Science {(FOCS} 2003), 11-14 October 2003, Cambridge, MA, USA, Proceedings}, pages = {80--91}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/SFCS.2003.1238183}, doi = {10.1109/SFCS.2003.1238183}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/MicaliRK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigecom/FortnowKPW03, author = {Lance Fortnow and Joe Kilian and David M. Pennock and Michael P. Wellman}, editor = {Daniel A. Menasc{\'{e}} and Noam Nisan}, title = {Betting boolean-style: a framework for trading in securities based on logical formulas}, booktitle = {Proceedings 4th {ACM} Conference on Electronic Commerce (EC-2003), San Diego, California, USA, June 9-12, 2003}, pages = {144--155}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/779928.779946}, doi = {10.1145/779928.779946}, timestamp = {Tue, 27 Nov 2018 11:56:48 +0100}, biburl = {https://dblp.org/rec/conf/sigecom/FortnowKPW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BatuEKMRRS03, author = {Tugkan Batu and Funda Erg{\"{u}}n and Joe Kilian and Avner Magen and Sofya Raskhodnikova and Ronitt Rubinfeld and Rahul Sami}, editor = {Lawrence L. Larmore and Michel X. Goemans}, title = {A sublinear algorithm for weakly approximating edit distance}, booktitle = {Proceedings of the 35th Annual {ACM} Symposium on Theory of Computing, June 9-11, 2003, San Diego, CA, {USA}}, pages = {316--324}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/780542.780590}, doi = {10.1145/780542.780590}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/BatuEKMRRS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/CowenFKK02, author = {Lenore Cowen and Ronald Fagin and Joe Kilian and Jon M. Kleinberg}, title = {Guest Editor's Foreword}, journal = {J. Comput. Syst. Sci.}, volume = {65}, number = {1}, pages = {1}, year = {2002}, url = {https://doi.org/10.1006/jcss.2002.1834}, doi = {10.1006/JCSS.2002.1834}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/CowenFKK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/CanettiKPR02, author = {Ran Canetti and Joe Kilian and Erez Petrank and Alon Rosen}, title = {Black-Box Concurrent Zero-Knowledge Requires (Almost) Logarithmically Many Rounds}, journal = {{SIAM} J. Comput.}, volume = {32}, number = {1}, pages = {1--47}, year = {2002}, url = {https://doi.org/10.1137/S0097539701392949}, doi = {10.1137/S0097539701392949}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/CanettiKPR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/FeigeK01, author = {Uriel Feige and Joe Kilian}, title = {Heuristics for Semirandom Graph Problems}, journal = {J. Comput. Syst. Sci.}, volume = {63}, number = {4}, pages = {639--671}, year = {2001}, url = {https://doi.org/10.1006/jcss.2001.1773}, doi = {10.1006/JCSS.2001.1773}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/FeigeK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KilianR01, author = {Joe Kilian and Phillip Rogaway}, title = {How to Protect {DES} Against Exhaustive Key Search (an Analysis of {DESX)}}, journal = {J. Cryptol.}, volume = {14}, number = {1}, pages = {17--35}, year = {2001}, url = {https://doi.org/10.1007/s001450010015}, doi = {10.1007/S001450010015}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KilianR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CohenKP01, author = {Tzafrir Cohen and Joe Kilian and Erez Petrank}, editor = {Colin Boyd}, title = {Responsive Round Complexity and Concurrent Zero-Knowledge}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2248}, pages = {422--441}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45682-1\_25}, doi = {10.1007/3-540-45682-1\_25}, timestamp = {Tue, 01 Jun 2021 15:22:33 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/CohenKP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/KilianP01, author = {Joe Kilian and Erez Petrank}, editor = {Jeffrey Scott Vitter and Paul G. Spirakis and Mihalis Yannakakis}, title = {Concurrent and resettable zero-knowledge in poly-loalgorithm rounds}, booktitle = {Proceedings on 33rd Annual {ACM} Symposium on Theory of Computing, July 6-8, 2001, Heraklion, Crete, Greece}, pages = {560--569}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/380752.380851}, doi = {10.1145/380752.380851}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/KilianP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/CanettiKPR01, author = {Ran Canetti and Joe Kilian and Erez Petrank and Alon Rosen}, editor = {Jeffrey Scott Vitter and Paul G. Spirakis and Mihalis Yannakakis}, title = {Black-box concurrent zero-knowledge requires Omega{\textasciitilde}(log n) rounds}, booktitle = {Proceedings on 33rd Annual {ACM} Symposium on Theory of Computing, July 6-8, 2001, Heraklion, Crete, Greece}, pages = {570--579}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/380752.380852}, doi = {10.1145/380752.380852}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/CanettiKPR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2001, editor = {Joe Kilian}, title = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2139}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44647-8}, doi = {10.1007/3-540-44647-8}, isbn = {3-540-42456-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CR-0107003, author = {Joe Kilian and Erez Petrank and Charles Rackoff}, title = {Lower Bounds for Zero-knowledge on the Internet}, journal = {CoRR}, volume = {cs.CR/0107003}, year = {2001}, url = {https://arxiv.org/abs/cs/0107003}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CR-0107003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CR-0107004, author = {Joe Kilian and Erez Petrank and Ransom Richardson}, title = {On Concurrent and Resettable Zero-Knowledge Proofs for {NP}}, journal = {CoRR}, volume = {cs.CR/0107004}, year = {2001}, url = {https://arxiv.org/abs/cs/0107004}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CR-0107004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR01-050, author = {Ran Canetti and Joe Kilian and Erez Petrank and Alon Rosen}, title = {Black-Box Concurrent Zero-Knowledge Requires {\textasciitilde}Omega(log n) Rounds}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR01-050}}, year = {2001}, url = {https://eccc.weizmann.ac.il/eccc-reports/2001/TR01-050/index.html}, eprinttype = {ECCC}, eprint = {TR01-050}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR01-050.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiKPR01, author = {Ran Canetti and Joe Kilian and Erez Petrank and Alon Rosen}, title = {Black-Box Concurrent Zero-Knowledge Requires Omega(log n) Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {51}, year = {2001}, url = {http://eprint.iacr.org/2001/051}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiKPR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/FeigeK00, author = {Uriel Feige and Joe Kilian}, title = {Finding {OR} in a noisy broadcast network}, journal = {Inf. Process. Lett.}, volume = {73}, number = {1-2}, pages = {69--75}, year = {2000}, url = {https://doi.org/10.1016/S0020-0190(00)00002-8}, doi = {10.1016/S0020-0190(00)00002-8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/FeigeK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/BellareKR00, author = {Mihir Bellare and Joe Kilian and Phillip Rogaway}, title = {The Security of the Cipher Block Chaining Message Authentication Code}, journal = {J. Comput. Syst. Sci.}, volume = {61}, number = {3}, pages = {362--399}, year = {2000}, url = {https://doi.org/10.1006/jcss.1999.1694}, doi = {10.1006/JCSS.1999.1694}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/BellareKR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/KilianKMO00, author = {Joe Kilian and Eyal Kushilevitz and Silvio Micali and Rafail Ostrovsky}, title = {Reducibility and Completeness in Private Computations}, journal = {{SIAM} J. Comput.}, volume = {29}, number = {4}, pages = {1189--1208}, year = {2000}, url = {https://doi.org/10.1137/S0097539797321742}, doi = {10.1137/S0097539797321742}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/KilianKMO00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/FeigeK00, author = {Uriel Feige and Joe Kilian}, title = {Two-Prover Protocols - Low Error at Affordable Rates}, journal = {{SIAM} J. Comput.}, volume = {30}, number = {1}, pages = {324--346}, year = {2000}, url = {https://doi.org/10.1137/S0097539797325375}, doi = {10.1137/S0097539797325375}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/FeigeK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/CachinCKM00, author = {Christian Cachin and Jan Camenisch and Joe Kilian and Joy M{\"{u}}ller}, editor = {Ugo Montanari and Jos{\'{e}} D. P. Rolim and Emo Welzl}, title = {One-Round Secure Computation and Secure Autonomous Mobile Agents}, booktitle = {Automata, Languages and Programming, 27th International Colloquium, {ICALP} 2000, Geneva, Switzerland, July 9-15, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1853}, pages = {512--523}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45022-X\_43}, doi = {10.1007/3-540-45022-X\_43}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/CachinCKM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/Kilian00, author = {Joe Kilian}, editor = {F. Frances Yao and Eugene M. Luks}, title = {More general completeness theorems for secure two-party computation}, booktitle = {Proceedings of the Thirty-Second Annual {ACM} Symposium on Theory of Computing, May 21-23, 2000, Portland, OR, {USA}}, pages = {316--324}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/335305.335342}, doi = {10.1145/335305.335342}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/Kilian00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KilianP00, author = {Joe Kilian and Erez Petrank}, title = {Concurrent Zero-Knowledge in Poly-logarithmic Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {2000}, url = {http://eprint.iacr.org/2000/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KilianP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/GoldwasserK99, author = {Shafi Goldwasser and Joe Kilian}, title = {Primality Testing Using Elliptic Curves}, journal = {J. {ACM}}, volume = {46}, number = {4}, pages = {450--472}, year = {1999}, url = {https://doi.org/10.1145/320211.320213}, doi = {10.1145/320211.320213}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/GoldwasserK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DamgardKS99, author = {Ivan Damg{\aa}rd and Joe Kilian and Louis Salvail}, editor = {Jacques Stern}, title = {On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {56--73}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_5}, doi = {10.1007/3-540-48910-X\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DamgardKS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ErgunKK99, author = {Funda Erg{\"{u}}n and Joe Kilian and Ravi Kumar}, editor = {Jacques Stern}, title = {A Note on the Limits of Collusion-Resistant Watermarks}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {140--149}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_10}, doi = {10.1007/3-540-48910-X\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ErgunKK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/RichardsonK99, author = {Ransom Richardson and Joe Kilian}, editor = {Jacques Stern}, title = {On the Concurrent Composition of Zero-Knowledge Proofs}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {415--431}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_29}, doi = {10.1007/3-540-48910-X\_29}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/RichardsonK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/FeigeK98, author = {Uriel Feige and Joe Kilian}, title = {Zero Knowledge and the Chromatic Number}, journal = {J. Comput. Syst. Sci.}, volume = {57}, number = {2}, pages = {187--199}, year = {1998}, url = {https://doi.org/10.1006/jcss.1998.1587}, doi = {10.1006/JCSS.1998.1587}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/FeigeK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KilianP98, author = {Joe Kilian and Erez Petrank}, title = {An Efficient Noninteractive Zero-Knowledge Proof System for {NP} with General Assumptions}, journal = {J. Cryptol.}, volume = {11}, number = {1}, pages = {1--27}, year = {1998}, url = {https://doi.org/10.1007/s001459900032}, doi = {10.1007/S001459900032}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KilianP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KilianP98, author = {Joe Kilian and Erez Petrank}, editor = {Hugo Krawczyk}, title = {Identity Escrow}, booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1462}, pages = {169--185}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055727}, doi = {10.1007/BFB0055727}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KilianP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/KilianPR98, author = {Joe Kilian and Erez Petrank and Charles Rackoff}, title = {Lower Bounds for Zero Knowledge on the Internet}, booktitle = {39th Annual Symposium on Foundations of Computer Science, {FOCS} '98, November 8-11, 1998, Palo Alto, California, {USA}}, pages = {484--492}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/SFCS.1998.743499}, doi = {10.1109/SFCS.1998.743499}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/KilianPR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/FeigeK98, author = {Uriel Feige and Joe Kilian}, title = {Heuristics for Finding Large Independent Sets, with Applications to Coloring Semi-Random Graphs}, booktitle = {39th Annual Symposium on Foundations of Computer Science, {FOCS} '98, November 8-11, 1998, Palo Alto, California, {USA}}, pages = {674--683}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/SFCS.1998.743518}, doi = {10.1109/SFCS.1998.743518}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/FeigeK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cjtcs/FeigeK97, author = {Uriel Feige and Joe Kilian}, title = {On Limited versus Polynomial Nondeterminism}, journal = {Chic. J. Theor. Comput. Sci.}, volume = {1997}, year = {1997}, url = {http://cjtcs.cs.uchicago.edu/articles/1997/1/contents.html}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cjtcs/FeigeK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BeaverFKR97, author = {Donald Beaver and Joan Feigenbaum and Joe Kilian and Phillip Rogaway}, title = {Locally Random Reductions: Improvements and Applications}, journal = {J. Cryptol.}, volume = {10}, number = {1}, pages = {17--36}, year = {1997}, url = {https://doi.org/10.1007/s001459900017}, doi = {10.1007/S001459900017}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BeaverFKR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/CoxKLS97, author = {Ingemar J. Cox and Joe Kilian and Frank Thomson Leighton and Talal Shamoon}, title = {Secure spread spectrum watermarking for multimedia}, journal = {{IEEE} Trans. Image Process.}, volume = {6}, number = {12}, pages = {1673--1687}, year = {1997}, url = {https://doi.org/10.1109/83.650120}, doi = {10.1109/83.650120}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tip/CoxKLS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/KilianPT97, author = {Joe Kilian and Erez Petrank and G{\'{a}}bor Tardos}, editor = {Frank Thomson Leighton and Peter W. Shor}, title = {Probabilistically Checkable Proofs with Zero Knowledge}, booktitle = {Proceedings of the Twenty-Ninth Annual {ACM} Symposium on the Theory of Computing, El Paso, Texas, USA, May 4-6, 1997}, pages = {496--505}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/258533.258643}, doi = {10.1145/258533.258643}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/KilianPT97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/FeigeK97, author = {Uriel Feige and Joe Kilian}, editor = {Frank Thomson Leighton and Peter W. Shor}, title = {Making Games Short (Extended Abstract)}, booktitle = {Proceedings of the Twenty-Ninth Annual {ACM} Symposium on the Theory of Computing, El Paso, Texas, USA, May 4-6, 1997}, pages = {506--516}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/258533.258644}, doi = {10.1145/258533.258644}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/FeigeK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KilianP97, author = {Joe Kilian and Erez Petrank}, title = {Identity Escrow}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {1997}, url = {http://eprint.iacr.org/1997/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KilianP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/KilianS96, author = {Joe Kilian and Hava T. Siegelmann}, title = {The Dynamic Universality of Sigmoidal Neural Networks}, journal = {Inf. Comput.}, volume = {128}, number = {1}, pages = {48--56}, year = {1996}, url = {https://doi.org/10.1006/inco.1996.0062}, doi = {10.1006/INCO.1996.0062}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/KilianS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coco/FeigeK96, author = {Uriel Feige and Joe Kilian}, editor = {Steven Homer and Jin{-}Yi Cai}, title = {Zero Knowledge and the Chromatic Number}, booktitle = {Proceedings of the Eleveth Annual {IEEE} Conference on Computational Complexity, Philadelphia, Pennsylvania, USA, May 24-27, 1996}, pages = {278--287}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/CCC.1996.507690}, doi = {10.1109/CCC.1996.507690}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coco/FeigeK96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KilianR96, author = {Joe Kilian and Phillip Rogaway}, editor = {Neal Koblitz}, title = {How to Protect {DES} Against Exhaustive Key Search}, booktitle = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1109}, pages = {252--267}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68697-5\_20}, doi = {10.1007/3-540-68697-5\_20}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KilianR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/CoxKLS96, author = {Ingemar J. Cox and Joe Kilian and Tom Leighton and Talal Shamoon}, title = {Secure spread spectrum watermarking for images, audio and video}, booktitle = {Proceedings 1996 International Conference on Image Processing, Lausanne, Switzerland, September 16-19, 1996}, pages = {243--246}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/ICIP.1996.560429}, doi = {10.1109/ICIP.1996.560429}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icip/CoxKLS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/CoxKLS96, author = {Ingemar J. Cox and Joe Kilian and Frank Thomson Leighton and Talal Shamoon}, editor = {Ross J. Anderson}, title = {A Secure, Robust Watermark for Multimedia}, booktitle = {Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1174}, pages = {185--206}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61996-8\_41}, doi = {10.1007/3-540-61996-8\_41}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/CoxKLS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KilianL95, author = {Joe Kilian and Frank Thomson Leighton}, editor = {Don Coppersmith}, title = {Fair Cryptosystems, Revisited: {A} Rigorous Approach to Key-Escrow (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {963}, pages = {208--221}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-44750-4\_17}, doi = {10.1007/3-540-44750-4\_17}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KilianL95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Kilian95, author = {Joe Kilian}, editor = {Don Coppersmith}, title = {Improved Efficient Arguments (Preliminary Version)}, booktitle = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {963}, pages = {311--324}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-44750-4\_25}, doi = {10.1007/3-540-44750-4\_25}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Kilian95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SakoK95, author = {Kazue Sako and Joe Kilian}, editor = {Louis C. Guillou and Jean{-}Jacques Quisquater}, title = {Receipt-Free Mix-Type Voting Scheme - {A} Practical Solution to the Implementation of a Voting Booth}, booktitle = {Advances in Cryptology - {EUROCRYPT} '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {921}, pages = {393--403}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-49264-X\_32}, doi = {10.1007/3-540-49264-X\_32}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SakoK95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/istcs/BellareFK95, author = {Mihir Bellare and Uriel Feige and Joe Kilian}, title = {On the Role of Shared Randomness in Two Prover Proof Systems}, booktitle = {Third Israel Symposium on Theory of Computing and Systems, {ISTCS} 1995, Tel Aviv, Israel, January 4-6, 1995, Proceedings}, pages = {199--208}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/ISTCS.1995.377031}, doi = {10.1109/ISTCS.1995.377031}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/istcs/BellareFK95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/istcs/KilianN95, author = {Joe Kilian and Moni Naor}, title = {On the Complexity of Statistical Reasoning (extended abtract)}, booktitle = {Third Israel Symposium on Theory of Computing and Systems, {ISTCS} 1995, Tel Aviv, Israel, January 4-6, 1995, Proceedings}, pages = {209--217}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/ISTCS.1995.377030}, doi = {10.1109/ISTCS.1995.377030}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/istcs/KilianN95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/FeigeK95, author = {Uriel Feige and Joe Kilian}, editor = {Frank Thomson Leighton and Allan Borodin}, title = {Impossibility results for recycling random bits in two-prover proof systems}, booktitle = {Proceedings of the Twenty-Seventh Annual {ACM} Symposium on Theory of Computing, 29 May-1 June 1995, Las Vegas, Nevada, {USA}}, pages = {457--468}, publisher = {{ACM}}, year = {1995}, url = {https://doi.org/10.1145/225058.225183}, doi = {10.1145/225058.225183}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/FeigeK95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR95-038, author = {Joe Kilian and Erez Petrank}, title = {An Efficient Non-Interactive Zero-Knowledge Proof System for {NP} with General Assumptions}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR95-038}}, year = {1995}, url = {https://eccc.weizmann.ac.il/eccc-reports/1995/TR95-038/index.html}, eprinttype = {ECCC}, eprint = {TR95-038}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR95-038.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colt/KilianLP94, author = {Joe Kilian and Kevin J. Lang and Barak A. Pearlmutter}, editor = {Manfred K. Warmuth}, title = {Playing the Matching-Shoulders Lob-Pass Game with Logarithmic Regret}, booktitle = {Proceedings of the Seventh Annual {ACM} Conference on Computational Learning Theory, {COLT} 1994, New Brunswick, NJ, USA, July 12-15, 1994}, pages = {159--164}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/180139.181094}, doi = {10.1145/180139.181094}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colt/KilianLP94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareKR94, author = {Mihir Bellare and Joe Kilian and Phillip Rogaway}, editor = {Yvo Desmedt}, title = {The Security of Cipher Block Chaining}, booktitle = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {839}, pages = {341--358}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-48658-5\_32}, doi = {10.1007/3-540-48658-5\_32}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareKR94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SakoK94, author = {Kazue Sako and Joe Kilian}, editor = {Yvo Desmedt}, title = {Secure Voting Using Partially Compatible Homomorphisms}, booktitle = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {839}, pages = {411--424}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-48658-5\_37}, doi = {10.1007/3-540-48658-5\_37}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SakoK94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/Kilian94, author = {Joe Kilian}, title = {On the complexity of Bounded-Interaction and Noninteractive Zero-Knowledge Proofs}, booktitle = {35th Annual Symposium on Foundations of Computer Science, Santa Fe, New Mexico, USA, 20-22 November 1994}, pages = {466--477}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/SFCS.1994.365744}, doi = {10.1109/SFCS.1994.365744}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/Kilian94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/FeigeK94, author = {Uriel Feige and Joe Kilian}, editor = {Frank Thomson Leighton and Michael T. Goodrich}, title = {Two prover protocols: low error at affordable rates}, booktitle = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Theory of Computing, 23-25 May 1994, Montr{\'{e}}al, Qu{\'{e}}bec, Canada}, pages = {172--183}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/195058.195128}, doi = {10.1145/195058.195128}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/FeigeK94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/FeigeKN94, author = {Uriel Feige and Joe Kilian and Moni Naor}, editor = {Frank Thomson Leighton and Michael T. Goodrich}, title = {A minimal model for secure computation (extended abstract)}, booktitle = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Theory of Computing, 23-25 May 1994, Montr{\'{e}}al, Qu{\'{e}}bec, Canada}, pages = {554--563}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/195058.195408}, doi = {10.1145/195058.195408}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/FeigeKN94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colt/KilianS93, author = {Joe Kilian and Hava T. Siegelmann}, editor = {Lenny Pitt}, title = {On the Power of Sigmoid Neural Networks}, booktitle = {Proceedings of the Sixth Annual {ACM} Conference on Computational Learning Theory, {COLT} 1993, Santa Cruz, CA, USA, July 26-28, 1993}, pages = {137--143}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/168304.168321}, doi = {10.1145/168304.168321}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colt/KilianS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CrepeauK93, author = {Claude Cr{\'{e}}peau and Joe Kilian}, editor = {Douglas R. Stinson}, title = {Discreet Solitary Games}, booktitle = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {773}, pages = {319--330}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48329-2\_27}, doi = {10.1007/3-540-48329-2\_27}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CrepeauK93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DworkFKNS92, author = {Cynthia Dwork and Uriel Feige and Joe Kilian and Moni Naor and Shmuel Safra}, editor = {Ernest F. Brickell}, title = {Low Communication 2-Prover Zero-Knowledge Proofs for {NP}}, booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {740}, pages = {215--227}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-48071-4\_15}, doi = {10.1007/3-540-48071-4\_15}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DworkFKNS92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/Kilian92, author = {Joe Kilian}, editor = {S. Rao Kosaraju and Mike Fellows and Avi Wigderson and John A. Ellis}, title = {A Note on Efficient Zero-Knowledge Proofs and Arguments (Extended Abstract)}, booktitle = {Proceedings of the 24th Annual {ACM} Symposium on Theory of Computing, May 4-6, 1992, Victoria, British Columbia, Canada}, pages = {723--732}, publisher = {{ACM}}, year = {1992}, url = {https://doi.org/10.1145/129712.129782}, doi = {10.1145/129712.129782}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/Kilian92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KilianR91, author = {Joe Kilian and Ronitt Rubinfeld}, editor = {Joan Feigenbaum}, title = {Interactive Proofs with Space Bounded Provers}, booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {576}, pages = {225--231}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46766-1\_17}, doi = {10.1007/3-540-46766-1\_17}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KilianR91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/Kilian91, author = {Joe Kilian}, editor = {Cris Koutsougeras and Jeffrey Scott Vitter}, title = {A General Completeness Theorem for Two-Party Games}, booktitle = {Proceedings of the 23rd Annual {ACM} Symposium on Theory of Computing, May 5-8, 1991, New Orleans, Louisiana, {USA}}, pages = {553--560}, publisher = {{ACM}}, year = {1991}, url = {https://doi.org/10.1145/103418.103475}, doi = {10.1145/103418.103475}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/Kilian91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0066918, author = {Joe Kilian}, title = {Uses of randomness in algorithms and protocols}, publisher = {{MIT} Press}, year = {1990}, isbn = {978-0-262-11153-9}, timestamp = {Thu, 05 May 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0066918.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/KilianKL90, author = {Joe Kilian and Shlomo Kipnis and Charles E. Leiserson}, title = {The Organization of Permutation Architectures with Bused Interconnections}, journal = {{IEEE} Trans. Computers}, volume = {39}, number = {11}, pages = {1346--1358}, year = {1990}, url = {https://doi.org/10.1109/12.61044}, doi = {10.1109/12.61044}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/KilianKL90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeaverFKR90, author = {Donald Beaver and Joan Feigenbaum and Joe Kilian and Phillip Rogaway}, editor = {Alfred Menezes and Scott A. Vanstone}, title = {Security with Low Communication Overhead}, booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {537}, pages = {62--76}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-38424-3\_5}, doi = {10.1007/3-540-38424-3\_5}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeaverFKR90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Kilian90, author = {Joe Kilian}, editor = {Alfred Menezes and Scott A. Vanstone}, title = {Achieving Zero-Knowledge Robustly}, booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {537}, pages = {313--325}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-38424-3\_23}, doi = {10.1007/3-540-38424-3\_23}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Kilian90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Kilian90a, author = {Joe Kilian}, editor = {Alfred Menezes and Scott A. Vanstone}, title = {Interactive Proofs with Provable Security Against Honest Verifiers}, booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {537}, pages = {378--392}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-38424-3\_28}, doi = {10.1007/3-540-38424-3\_28}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Kilian90a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/AbadiFK89, author = {Mart{\'{\i}}n Abadi and Joan Feigenbaum and Joe Kilian}, title = {On Hiding Information from an Oracle}, journal = {J. Comput. Syst. Sci.}, volume = {39}, number = {1}, pages = {21--50}, year = {1989}, url = {https://doi.org/10.1016/0022-0000(89)90018-4}, doi = {10.1016/0022-0000(89)90018-4}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/AbadiFK89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Ben-OrGKW89, author = {Michael Ben{-}Or and Shafi Goldwasser and Joe Kilian and Avi Wigderson}, editor = {Gilles Brassard}, title = {Efficient Identification Schemes Using Two Prover Interactive Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {498--506}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_44}, doi = {10.1007/0-387-34805-0\_44}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Ben-OrGKW89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KilianO89, author = {Joe Kilian and Silvio Micali and Rafail Ostrovsky}, editor = {Gilles Brassard}, title = {Minimum Resource Zero-Knowledge Proofs (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {545--546}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_47}, doi = {10.1007/0-387-34805-0\_47}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KilianO89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/KilianMO89, author = {Joe Kilian and Silvio Micali and Rafail Ostrovsky}, title = {Minimum Resource Zero-Knowledge Proofs (Extended Abstract)}, booktitle = {30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October - 1 November 1989}, pages = {474--479}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/SFCS.1989.63521}, doi = {10.1109/SFCS.1989.63521}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/KilianMO89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CrepeauK88, author = {Claude Cr{\'{e}}peau and Joe Kilian}, editor = {Shafi Goldwasser}, title = {Weakening Security Assumptions and Oblivious Transfer (Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {2--7}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_1}, doi = {10.1007/0-387-34799-2\_1}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CrepeauK88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Ben-OrGGHKMR88, author = {Michael Ben{-}Or and Oded Goldreich and Shafi Goldwasser and Johan H{\aa}stad and Joe Kilian and Silvio Micali and Phillip Rogaway}, editor = {Shafi Goldwasser}, title = {Everything Provable is Provable in Zero-Knowledge}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {37--56}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_4}, doi = {10.1007/0-387-34799-2\_4}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Ben-OrGGHKMR88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/Kilian88, author = {Joe Kilian}, title = {Zero-knowledge with Log-Space Verifiers}, booktitle = {29th Annual Symposium on Foundations of Computer Science, White Plains, New York, USA, 24-26 October 1988}, pages = {25--35}, publisher = {{IEEE} Computer Society}, year = {1988}, url = {https://doi.org/10.1109/SFCS.1988.21918}, doi = {10.1109/SFCS.1988.21918}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/Kilian88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/CrepeauK88, author = {Claude Cr{\'{e}}peau and Joe Kilian}, title = {Achieving Oblivious Transfer Using Weakened Security Assumptions (Extended Abstract)}, booktitle = {29th Annual Symposium on Foundations of Computer Science, White Plains, New York, USA, 24-26 October 1988}, pages = {42--52}, publisher = {{IEEE} Computer Society}, year = {1988}, url = {https://doi.org/10.1109/SFCS.1988.21920}, doi = {10.1109/SFCS.1988.21920}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/CrepeauK88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/Kilian88, author = {Joe Kilian}, editor = {Janos Simon}, title = {Founding Cryptography on Oblivious Transfer}, booktitle = {Proceedings of the 20th Annual {ACM} Symposium on Theory of Computing, May 2-4, 1988, Chicago, Illinois, {USA}}, pages = {20--31}, publisher = {{ACM}}, year = {1988}, url = {https://doi.org/10.1145/62212.62215}, doi = {10.1145/62212.62215}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/Kilian88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/Ben-OrGKW88, author = {Michael Ben{-}Or and Shafi Goldwasser and Joe Kilian and Avi Wigderson}, editor = {Janos Simon}, title = {Multi-Prover Interactive Proofs: How to Remove Intractability Assumptions}, booktitle = {Proceedings of the 20th Annual {ACM} Symposium on Theory of Computing, May 2-4, 1988, Chicago, Illinois, {USA}}, pages = {113--131}, publisher = {{ACM}}, year = {1988}, url = {https://doi.org/10.1145/62212.62223}, doi = {10.1145/62212.62223}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/Ben-OrGKW88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coco/AbadiFK87, author = {Mart{\'{\i}}n Abadi and Joan Feigenbaum and Joe Kilian}, title = {On hiding information from an oracle}, booktitle = {Proceedings of the Second Annual Conference on Structure in Complexity Theory, Cornell University, Ithaca, New York, USA, June 16-19, 1987}, pages = {9}, publisher = {{IEEE} Computer Society}, year = {1987}, url = {https://ieeexplore.ieee.org/document/10319247}, timestamp = {Tue, 21 Nov 2023 11:59:25 +0100}, biburl = {https://dblp.org/rec/conf/coco/AbadiFK87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/KilianKL87, author = {Joe Kilian and Shlomo Kipnis and Charles E. Leiserson}, title = {The Organization of Permutation Architectures with Bussed Interconnections (Extended Abstract)}, booktitle = {28th Annual Symposium on Foundations of Computer Science, Los Angeles, California, USA, 27-29 October 1987}, pages = {305--315}, publisher = {{IEEE} Computer Society}, year = {1987}, url = {https://doi.org/10.1109/SFCS.1987.58}, doi = {10.1109/SFCS.1987.58}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/KilianKL87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/AbadiFK87, author = {Mart{\'{\i}}n Abadi and Joan Feigenbaum and Joe Kilian}, editor = {Alfred V. Aho}, title = {On Hiding Information from an Oracle (Extended Abstract)}, booktitle = {Proceedings of the 19th Annual {ACM} Symposium on Theory of Computing, 1987, New York, New York, {USA}}, pages = {195--203}, publisher = {{ACM}}, year = {1987}, url = {https://doi.org/10.1145/28395.28417}, doi = {10.1145/28395.28417}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/AbadiFK87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GoldwasserK86, author = {Shafi Goldwasser and Joe Kilian}, editor = {Juris Hartmanis}, title = {Almost All Primes Can Be Quickly Certified}, booktitle = {Proceedings of the 18th Annual {ACM} Symposium on Theory of Computing, May 28-30, 1986, Berkeley, California, {USA}}, pages = {316--329}, publisher = {{ACM}}, year = {1986}, url = {https://doi.org/10.1145/12130.12162}, doi = {10.1145/12130.12162}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GoldwasserK86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.