BibTeX records: Guy N. Rothblum

download as .bib file

@inproceedings{DBLP:conf/soda/ChenGLRR19,
  author    = {Lijie Chen and
               Shafi Goldwasser and
               Kaifeng Lyu and
               Guy N. Rothblum and
               Aviad Rubinstein},
  title     = {Fine-grained Complexity Meets {IP} = {PSPACE}},
  booktitle = {Proceedings of the Thirtieth Annual {ACM-SIAM} Symposium on Discrete
               Algorithms, {SODA} 2019, San Diego, California, USA, January 6-9,
               2019},
  pages     = {1--20},
  year      = {2019},
  crossref  = {DBLP:conf/soda/2019},
  url       = {https://doi.org/10.1137/1.9781611975482.1},
  doi       = {10.1137/1.9781611975482.1},
  timestamp = {Tue, 12 Mar 2019 15:52:39 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/soda/ChenGLRR19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coco/ReingoldRR18,
  author    = {Omer Reingold and
               Guy N. Rothblum and
               Ron D. Rothblum},
  title     = {Efficient Batch Verification for {UP}},
  booktitle = {33rd Computational Complexity Conference, {CCC} 2018, June 22-24,
               2018, San Diego, CA, {USA}},
  pages     = {22:1--22:23},
  year      = {2018},
  crossref  = {DBLP:conf/coco/2018},
  url       = {https://doi.org/10.4230/LIPIcs.CCC.2018.22},
  doi       = {10.4230/LIPIcs.CCC.2018.22},
  timestamp = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/coco/ReingoldRR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GoldreichR18,
  author    = {Oded Goldreich and
               Guy N. Rothblum},
  title     = {Counting t-Cliques: Worst-Case to Average-Case Reductions and Direct
               Interactive Proof Systems},
  booktitle = {59th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
               2018, Paris, France, October 7-9, 2018},
  pages     = {77--88},
  year      = {2018},
  crossref  = {DBLP:conf/focs/2018},
  url       = {https://doi.org/10.1109/FOCS.2018.00017},
  doi       = {10.1109/FOCS.2018.00017},
  timestamp = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/focs/GoldreichR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/Hebert-JohnsonK18,
  author    = {{\'{U}}rsula H{\'{e}}bert{-}Johnson and
               Michael P. Kim and
               Omer Reingold and
               Guy N. Rothblum},
  title     = {Multicalibration: Calibration for the (Computationally-Identifiable)
               Masses},
  booktitle = {Proceedings of the 35th International Conference on Machine Learning,
               {ICML} 2018, Stockholmsm{\"{a}}ssan, Stockholm, Sweden, July
               10-15, 2018},
  pages     = {1944--1953},
  year      = {2018},
  crossref  = {DBLP:conf/icml/2018},
  url       = {http://proceedings.mlr.press/v80/hebert-johnson18a.html},
  timestamp = {Wed, 03 Apr 2019 18:17:30 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icml/Hebert-JohnsonK18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/YonaR18,
  author    = {Gal Yona and
               Guy N. Rothblum},
  title     = {Probably Approximately Metric-Fair Learning},
  booktitle = {Proceedings of the 35th International Conference on Machine Learning,
               {ICML} 2018, Stockholmsm{\"{a}}ssan, Stockholm, Sweden, July
               10-15, 2018},
  pages     = {5666--5674},
  year      = {2018},
  crossref  = {DBLP:conf/icml/2018},
  url       = {http://proceedings.mlr.press/v80/yona18a.html},
  timestamp = {Wed, 03 Apr 2019 18:17:30 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icml/YonaR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/0001R18,
  author    = {Oded Goldreich and
               Guy N. Rothblum},
  title     = {Simple Doubly-Efficient Interactive Proof Systems for Locally-Characterizable
               Sets},
  booktitle = {9th Innovations in Theoretical Computer Science Conference, {ITCS}
               2018, January 11-14, 2018, Cambridge, MA, {USA}},
  pages     = {18:1--18:19},
  year      = {2018},
  crossref  = {DBLP:conf/innovations/2018},
  url       = {https://doi.org/10.4230/LIPIcs.ITCS.2018.18},
  doi       = {10.4230/LIPIcs.ITCS.2018.18},
  timestamp = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/innovations/0001R18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/KimRR18,
  author    = {Michael P. Kim and
               Omer Reingold and
               Guy N. Rothblum},
  title     = {Fairness Through Computationally-Bounded Awareness},
  booktitle = {Advances in Neural Information Processing Systems 31: Annual Conference
               on Neural Information Processing Systems 2018, NeurIPS 2018, 3-8 December
               2018, Montr{\'{e}}al, Canada.},
  pages     = {4847--4857},
  year      = {2018},
  crossref  = {DBLP:conf/nips/2018},
  url       = {http://papers.nips.cc/paper/7733-fairness-through-computationally-bounded-awareness},
  timestamp = {Sun, 16 Dec 2018 17:30:05 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/nips/KimRR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BunDRS18,
  author    = {Mark Bun and
               Cynthia Dwork and
               Guy N. Rothblum and
               Thomas Steinke},
  title     = {Composable and versatile privacy via truncated {CDP}},
  booktitle = {Proceedings of the 50th Annual {ACM} {SIGACT} Symposium on Theory
               of Computing, {STOC} 2018, Los Angeles, CA, USA, June 25-29, 2018},
  pages     = {74--86},
  year      = {2018},
  crossref  = {DBLP:conf/stoc/2018},
  url       = {https://doi.org/10.1145/3188745.3188946},
  doi       = {10.1145/3188745.3188946},
  timestamp = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/stoc/BunDRS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-03239,
  author    = {Michael P. Kim and
               Omer Reingold and
               Guy N. Rothblum},
  title     = {Fairness Through Computationally-Bounded Awareness},
  journal   = {CoRR},
  volume    = {abs/1803.03239},
  year      = {2018},
  url       = {http://arxiv.org/abs/1803.03239},
  archivePrefix = {arXiv},
  eprint    = {1803.03239},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1803-03239},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-03242,
  author    = {Guy N. Rothblum and
               Gal Yona},
  title     = {Probably Approximately Metric-Fair Learning},
  journal   = {CoRR},
  volume    = {abs/1803.03242},
  year      = {2018},
  url       = {http://arxiv.org/abs/1803.03242},
  archivePrefix = {arXiv},
  eprint    = {1803.03242},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1803-03242},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-02351,
  author    = {Lijie Chen and
               Shafi Goldwasser and
               Kaifeng Lyu and
               Guy N. Rothblum and
               Aviad Rubinstein},
  title     = {Fine-grained Complexity Meets {IP} = {PSPACE}},
  journal   = {CoRR},
  volume    = {abs/1805.02351},
  year      = {2018},
  url       = {http://arxiv.org/abs/1805.02351},
  archivePrefix = {arXiv},
  eprint    = {1805.02351},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1805-02351},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ReingoldRR18,
  author    = {Omer Reingold and
               Guy N. Rothblum and
               Ron Rothblum},
  title     = {Efficient Batch Verification for {UP}},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {25},
  pages     = {22},
  year      = {2018},
  url       = {https://eccc.weizmann.ac.il/report/2018/022},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eccc/ReingoldRR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GoldreichR18a,
  author    = {Oded Goldreich and
               Guy N. Rothblum},
  title     = {Counting \emph{t}-cliques: Worst-case to average-case reductions and
               Direct interactive proof systems},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {25},
  pages     = {46},
  year      = {2018},
  url       = {https://eccc.weizmann.ac.il/report/2018/046},
  timestamp = {Wed, 12 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eccc/GoldreichR18a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GoldreichR18b,
  author    = {Oded Goldreich and
               Guy N. Rothblum},
  title     = {Constant-round interactive proof systems for {AC0[2]} and {NC1}},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {25},
  pages     = {69},
  year      = {2018},
  url       = {https://eccc.weizmann.ac.il/report/2018/069},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eccc/GoldreichR18b},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiCHLRR18,
  author    = {Ran Canetti and
               Yilei Chen and
               Justin Holmgren and
               Alex Lombardi and
               Guy N. Rothblum and
               Ron D. Rothblum},
  title     = {Fiat-Shamir From Simpler Assumptions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {1004},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/1004},
  timestamp = {Tue, 13 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CanettiCHLRR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BrakerskiR17,
  author    = {Zvika Brakerski and
               Guy N. Rothblum},
  title     = {Obfuscating Conjunctions},
  journal   = {J. Cryptology},
  volume    = {30},
  number    = {1},
  pages     = {289--320},
  year      = {2017},
  url       = {https://doi.org/10.1007/s00145-015-9221-5},
  doi       = {10.1007/s00145-015-9221-5},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/joc/BrakerskiR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KalaiRR17,
  author    = {Yael Tauman Kalai and
               Guy N. Rothblum and
               Ron D. Rothblum},
  title     = {From Obfuscation to the Security of Fiat-Shamir for Proofs},
  booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
               Proceedings, Part {II}},
  pages     = {224--251},
  year      = {2017},
  crossref  = {DBLP:conf/crypto/2017-2},
  url       = {https://doi.org/10.1007/978-3-319-63715-0\_8},
  doi       = {10.1007/978-3-319-63715-0\_8},
  timestamp = {Mon, 14 Aug 2017 14:37:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/KalaiRR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/PanethR17,
  author    = {Omer Paneth and
               Guy N. Rothblum},
  title     = {On Zero-Testable Homomorphic Encryption and Publicly Verifiable Non-interactive
               Arguments},
  booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
               Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}},
  pages     = {283--315},
  year      = {2017},
  crossref  = {DBLP:conf/tcc/2017-2},
  url       = {https://doi.org/10.1007/978-3-319-70503-3\_9},
  doi       = {10.1007/978-3-319-70503-3\_9},
  timestamp = {Tue, 07 Nov 2017 12:38:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/PanethR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-08513,
  author    = {{\'{U}}rsula H{\'{e}}bert{-}Johnson and
               Michael P. Kim and
               Omer Reingold and
               Guy N. Rothblum},
  title     = {Calibration for the (Computationally-Identifiable) Masses},
  journal   = {CoRR},
  volume    = {abs/1711.08513},
  year      = {2017},
  url       = {http://arxiv.org/abs/1711.08513},
  archivePrefix = {arXiv},
  eprint    = {1711.08513},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1711-08513},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GoldreichR17,
  author    = {Oded Goldreich and
               Guy N. Rothblum},
  title     = {Simple doubly-efficient interactive proof systems for locally-characterizable
               sets},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {24},
  pages     = {18},
  year      = {2017},
  url       = {https://eccc.weizmann.ac.il/report/2017/018},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eccc/GoldreichR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GoldwasserRK17,
  author    = {Shafi Goldwasser and
               Guy N. Rothblum and
               Yael Tauman Kalai},
  title     = {Delegating Computation: Interactive Proofs for Muggles},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {24},
  pages     = {108},
  year      = {2017},
  url       = {https://eccc.weizmann.ac.il/report/2017/108},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eccc/GoldwasserRK17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GoldreichR17a,
  author    = {Oded Goldreich and
               Guy N. Rothblum},
  title     = {Worst-case to Average-case reductions for subclasses of {P}},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {24},
  pages     = {130},
  year      = {2017},
  url       = {https://eccc.weizmann.ac.il/report/2017/130},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eccc/GoldreichR17a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanethR17,
  author    = {Omer Paneth and
               Guy N. Rothblum},
  title     = {On Zero-Testable Homomorphic Encryption and Publicly Verifiable Non-Interactive
               Arguments},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {903},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/903},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/PanethR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DworkNR16,
  author    = {Cynthia Dwork and
               Moni Naor and
               Guy N. Rothblum},
  title     = {Spooky Interaction and Its Discontents: Compilers for Succinct Two-Message
               Argument Systems},
  booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {III}},
  pages     = {123--145},
  year      = {2016},
  crossref  = {DBLP:conf/crypto/2016-3},
  url       = {https://doi.org/10.1007/978-3-662-53015-3\_5},
  doi       = {10.1007/978-3-662-53015-3\_5},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/DworkNR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/ReingoldRR16,
  author    = {Omer Reingold and
               Guy N. Rothblum and
               Ron D. Rothblum},
  title     = {Constant-round interactive proofs for delegating computation},
  booktitle = {Proceedings of the 48th Annual {ACM} {SIGACT} Symposium on Theory
               of Computing, {STOC} 2016, Cambridge, MA, USA, June 18-21, 2016},
  pages     = {49--62},
  year      = {2016},
  crossref  = {DBLP:conf/stoc/2016},
  url       = {https://doi.org/10.1145/2897518.2897652},
  doi       = {10.1145/2897518.2897652},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/stoc/ReingoldRR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DworkR16,
  author    = {Cynthia Dwork and
               Guy N. Rothblum},
  title     = {Concentrated Differential Privacy},
  journal   = {CoRR},
  volume    = {abs/1603.01887},
  year      = {2016},
  url       = {http://arxiv.org/abs/1603.01887},
  archivePrefix = {arXiv},
  eprint    = {1603.01887},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/DworkR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/DworkNR16,
  author    = {Cynthia Dwork and
               Moni Naor and
               Guy N. Rothblum},
  title     = {Spooky Interaction and its Discontents: Compilers for Succinct Two-Message
               Argument Systems},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {23},
  pages     = {49},
  year      = {2016},
  url       = {http://eccc.hpi-web.de/report/2016/049},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eccc/DworkNR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ReingoldRR16,
  author    = {Omer Reingold and
               Ron Rothblum and
               Guy N. Rothblum},
  title     = {Constant-Round Interactive Proofs for Delegating Computation},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {23},
  pages     = {61},
  year      = {2016},
  url       = {http://eccc.hpi-web.de/report/2016/061},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eccc/ReingoldRR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DworkNR16,
  author    = {Cynthia Dwork and
               Moni Naor and
               Guy N. Rothblum},
  title     = {Spooky Interaction and its Discontents: Compilers for Succinct Two-Message
               Argument Systems},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {291},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/291},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/DworkNR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalaiRR16,
  author    = {Yael Tauman Kalai and
               Guy N. Rothblum and
               Ron D. Rothblum},
  title     = {From Obfuscation to the Security of Fiat-Shamir for Proofs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {303},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/303},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/KalaiRR16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/GoldwasserKR15,
  author    = {Shafi Goldwasser and
               Yael Tauman Kalai and
               Guy N. Rothblum},
  title     = {Delegating Computation: Interactive Proofs for Muggles},
  journal   = {J. {ACM}},
  volume    = {62},
  number    = {4},
  pages     = {27:1--27:64},
  year      = {2015},
  url       = {https://doi.org/10.1145/2699436},
  doi       = {10.1145/2699436},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jacm/GoldwasserKR15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/GoldwasserR15,
  author    = {Shafi Goldwasser and
               Guy N. Rothblum},
  title     = {How to Compute in the Presence of Leakage},
  journal   = {{SIAM} J. Comput.},
  volume    = {44},
  number    = {5},
  pages     = {1480--1549},
  year      = {2015},
  url       = {https://doi.org/10.1137/130931461},
  doi       = {10.1137/130931461},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/siamcomp/GoldwasserR15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DworkNRR15,
  author    = {Cynthia Dwork and
               Moni Naor and
               Omer Reingold and
               Guy N. Rothblum},
  title     = {Pure Differential Privacy for Rectangle Queries via Private Partitions},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {II}},
  pages     = {735--751},
  year      = {2015},
  crossref  = {DBLP:conf/asiacrypt/2015-2},
  url       = {https://doi.org/10.1007/978-3-662-48800-3\_30},
  doi       = {10.1007/978-3-662-48800-3\_30},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/DworkNRR15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GoldwasserR14,
  author    = {Shafi Goldwasser and
               Guy N. Rothblum},
  title     = {On Best-Possible Obfuscation},
  journal   = {J. Cryptology},
  volume    = {27},
  number    = {3},
  pages     = {480--505},
  year      = {2014},
  url       = {https://doi.org/10.1007/s00145-013-9151-z},
  doi       = {10.1007/s00145-013-9151-z},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/joc/GoldwasserR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/MekaRRR14,
  author    = {Raghu Meka and
               Omer Reingold and
               Guy N. Rothblum and
               Ron D. Rothblum},
  title     = {Fast Pseudorandomness for Independence and Load Balancing - (Extended
               Abstract)},
  booktitle = {Automata, Languages, and Programming - 41st International Colloquium,
               {ICALP} 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part
               {I}},
  pages     = {859--870},
  year      = {2014},
  crossref  = {DBLP:conf/icalp/2014-1},
  url       = {https://doi.org/10.1007/978-3-662-43948-7\_71},
  doi       = {10.1007/978-3-662-43948-7\_71},
  timestamp = {Tue, 23 May 2017 01:08:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/MekaRRR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/BrakerskiR14,
  author    = {Zvika Brakerski and
               Guy N. Rothblum},
  title     = {Black-box obfuscation for d-CNFs},
  booktitle = {Innovations in Theoretical Computer Science, ITCS'14, Princeton, NJ,
               USA, January 12-14, 2014},
  pages     = {235--250},
  year      = {2014},
  crossref  = {DBLP:conf/innovations/2014},
  url       = {https://doi.org/10.1145/2554797.2554820},
  doi       = {10.1145/2554797.2554820},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/innovations/BrakerskiR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BrakerskiR14,
  author    = {Zvika Brakerski and
               Guy N. Rothblum},
  title     = {Virtual Black-Box Obfuscation for All Circuits via Generic Graded
               Encoding},
  booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
               2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  pages     = {1--25},
  year      = {2014},
  crossref  = {DBLP:conf/tcc/2014},
  url       = {https://doi.org/10.1007/978-3-642-54242-8\_1},
  doi       = {10.1007/978-3-642-54242-8\_1},
  timestamp = {Fri, 02 Nov 2018 09:44:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/BrakerskiR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanethR14,
  author    = {Omer Paneth and
               Guy N. Rothblum},
  title     = {Publicly Verifiable Non-Interactive Arguments for Delegating Computation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {981},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/981},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/PanethR14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/CanettiRR13,
  author    = {Ran Canetti and
               Ben Riva and
               Guy N. Rothblum},
  title     = {Refereed delegation of computation},
  journal   = {Inf. Comput.},
  volume    = {226},
  pages     = {16--36},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.ic.2013.03.003},
  doi       = {10.1016/j.ic.2013.03.003},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iandc/CanettiRR13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrakerskiR13,
  author    = {Zvika Brakerski and
               Guy N. Rothblum},
  title     = {Obfuscating Conjunctions},
  booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  pages     = {416--434},
  year      = {2013},
  crossref  = {DBLP:conf/crypto/2013-2},
  url       = {https://doi.org/10.1007/978-3-642-40084-1\_24},
  doi       = {10.1007/978-3-642-40084-1\_24},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/BrakerskiR13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/RothblumVW13,
  author    = {Guy N. Rothblum and
               Salil P. Vadhan and
               Avi Wigderson},
  title     = {Interactive proofs of proximity: delegating computation in sublinear
               time},
  booktitle = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA,
               USA, June 1-4, 2013},
  pages     = {793--802},
  year      = {2013},
  crossref  = {DBLP:conf/stoc/2013},
  url       = {https://doi.org/10.1145/2488608.2488709},
  doi       = {10.1145/2488608.2488709},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/stoc/RothblumVW13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiR13,
  author    = {Zvika Brakerski and
               Guy N. Rothblum},
  title     = {Obfuscating Conjunctions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {471},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/471},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BrakerskiR13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiR13a,
  author    = {Zvika Brakerski and
               Guy N. Rothblum},
  title     = {Black-Box Obfuscation for d-CNFs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {557},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/557},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BrakerskiR13a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiR13b,
  author    = {Zvika Brakerski and
               Guy N. Rothblum},
  title     = {Virtual Black-Box Obfuscation for All Circuits via Generic Graded
               Encoding},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {563},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/563},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BrakerskiR13b},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Rothblum12,
  author    = {Guy N. Rothblum},
  title     = {How to Compute under {\textdollar}\{{\textbackslash}cal\{AC\}\}{\^{}}\{{\textbackslash}sf0\}{\textdollar}
               Leakage without Secure Hardware},
  booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  pages     = {552--569},
  year      = {2012},
  crossref  = {DBLP:conf/crypto/2012},
  url       = {https://doi.org/10.1007/978-3-642-32009-5\_32},
  doi       = {10.1007/978-3-642-32009-5\_32},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/Rothblum12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GoldwasserR12,
  author    = {Shafi Goldwasser and
               Guy N. Rothblum},
  title     = {How to Compute in the Presence of Leakage},
  booktitle = {53rd Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
               2012, New Brunswick, NJ, USA, October 20-23, 2012},
  pages     = {31--40},
  year      = {2012},
  crossref  = {DBLP:conf/focs/2012},
  url       = {https://doi.org/10.1109/FOCS.2012.34},
  doi       = {10.1109/FOCS.2012.34},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/focs/GoldwasserR12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/CanettiRR12,
  author    = {Ran Canetti and
               Ben Riva and
               Guy N. Rothblum},
  title     = {Two Protocols for Delegation of Computation},
  booktitle = {Information Theoretic Security - 6th International Conference, {ICITS}
               2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings},
  pages     = {37--61},
  year      = {2012},
  crossref  = {DBLP:conf/icits/2012},
  url       = {https://doi.org/10.1007/978-3-642-32284-6\_3},
  doi       = {10.1007/978-3-642-32284-6\_3},
  timestamp = {Wed, 17 May 2017 10:54:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icits/CanettiRR12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/HardtRS12,
  author    = {Moritz Hardt and
               Guy N. Rothblum and
               Rocco A. Servedio},
  title     = {Private data release via learning thresholds},
  booktitle = {Proceedings of the Twenty-Third Annual {ACM-SIAM} Symposium on Discrete
               Algorithms, {SODA} 2012, Kyoto, Japan, January 17-19, 2012},
  pages     = {168--187},
  year      = {2012},
  crossref  = {DBLP:conf/soda/2012},
  url       = {http://portal.acm.org/citation.cfm?id=2095131\&\#38;CFID=63838676\&\#38;CFTOKEN=79617016},
  timestamp = {Wed, 24 May 2017 08:31:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/soda/HardtRS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GoldwasserR12,
  author    = {Shafi Goldwasser and
               Guy N. Rothblum},
  title     = {How to Compute in the Presence of Leakage},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {19},
  pages     = {10},
  year      = {2012},
  url       = {http://eccc.hpi-web.de/report/2012/010},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eccc/GoldwasserR12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HohenbergerRSV11,
  author    = {Susan Hohenberger and
               Guy N. Rothblum and
               Abhi Shelat and
               Vinod Vaikuntanathan},
  title     = {Securely Obfuscating Re-Encryption},
  journal   = {J. Cryptology},
  volume    = {24},
  number    = {4},
  pages     = {694--719},
  year      = {2011},
  url       = {https://doi.org/10.1007/s00145-010-9077-7},
  doi       = {10.1007/s00145-010-9077-7},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/joc/HohenbergerRSV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BitanskyCGHKR11,
  author    = {Nir Bitansky and
               Ran Canetti and
               Shafi Goldwasser and
               Shai Halevi and
               Yael Tauman Kalai and
               Guy N. Rothblum},
  title     = {Program Obfuscation with Leaky Hardware},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Seoul, South Korea, December 4-8, 2011. Proceedings},
  pages     = {722--739},
  year      = {2011},
  crossref  = {DBLP:conf/asiacrypt/2011},
  url       = {https://doi.org/10.1007/978-3-642-25385-0\_39},
  doi       = {10.1007/978-3-642-25385-0\_39},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/BitanskyCGHKR11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CanettiRR11,
  author    = {Ran Canetti and
               Ben Riva and
               Guy N. Rothblum},
  title     = {Practical delegation of computation using multiple servers},
  booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications
               Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages     = {445--454},
  year      = {2011},
  crossref  = {DBLP:conf/ccs/2011},
  url       = {https://doi.org/10.1145/2046707.2046759},
  doi       = {10.1145/2046707.2046759},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/CanettiRR11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/DvirGRV11,
  author    = {Zeev Dvir and
               Dan Gutfreund and
               Guy N. Rothblum and
               Salil P. Vadhan},
  title     = {On Approximating the Entropy of Polynomial Mappings},
  booktitle = {Innovations in Computer Science - {ICS} 2010, Tsinghua University,
               Beijing, China, January 7-9, 2011. Proceedings},
  pages     = {460--475},
  year      = {2011},
  crossref  = {DBLP:conf/innovations/2011},
  url       = {http://conference.itcs.tsinghua.edu.cn/ICS2011/content/papers/28.html},
  timestamp = {Wed, 19 Oct 2011 15:40:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/innovations/DvirGRV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1107-2444,
  author    = {Moritz Hardt and
               Guy N. Rothblum and
               Rocco A. Servedio},
  title     = {Private Data Release via Learning Thresholds},
  journal   = {CoRR},
  volume    = {abs/1107.2444},
  year      = {2011},
  url       = {http://arxiv.org/abs/1107.2444},
  archivePrefix = {arXiv},
  eprint    = {1107.2444},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1107-2444},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiRR11,
  author    = {Ran Canetti and
               Ben Riva and
               Guy N. Rothblum},
  title     = {Two 1-Round Protocols for Delegation of Computation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {518},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/518},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/CanettiRR11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyCGHKR11,
  author    = {Nir Bitansky and
               Ran Canetti and
               Shafi Goldwasser and
               Shai Halevi and
               Yael Tauman Kalai and
               Guy N. Rothblum},
  title     = {Program Obfuscation with Leaky Hardware},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {660},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/660},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BitanskyCGHKR11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cc/RothblumV10,
  author    = {Guy N. Rothblum and
               Salil P. Vadhan},
  title     = {Are PCPs Inherent in Efficient Arguments?},
  journal   = {Computational Complexity},
  volume    = {19},
  number    = {2},
  pages     = {265--304},
  year      = {2010},
  url       = {https://doi.org/10.1007/s00037-010-0291-3},
  doi       = {10.1007/s00037-010-0291-3},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cc/RothblumV10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoldwasserR10,
  author    = {Shafi Goldwasser and
               Guy N. Rothblum},
  title     = {Securing Computation against Continuous Leakage},
  booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  pages     = {59--79},
  year      = {2010},
  crossref  = {DBLP:conf/crypto/2010},
  url       = {https://doi.org/10.1007/978-3-642-14623-7\_4},
  doi       = {10.1007/978-3-642-14623-7\_4},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/GoldwasserR10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/DworkRV10,
  author    = {Cynthia Dwork and
               Guy N. Rothblum and
               Salil P. Vadhan},
  title     = {Boosting and Differential Privacy},
  booktitle = {51th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
               2010, October 23-26, 2010, Las Vegas, Nevada, {USA}},
  pages     = {51--60},
  year      = {2010},
  crossref  = {DBLP:conf/focs/2010},
  url       = {https://doi.org/10.1109/FOCS.2010.12},
  doi       = {10.1109/FOCS.2010.12},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/focs/DworkRV10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/HardtR10,
  author    = {Moritz Hardt and
               Guy N. Rothblum},
  title     = {A Multiplicative Weights Mechanism for Privacy-Preserving Data Analysis},
  booktitle = {51th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
               2010, October 23-26, 2010, Las Vegas, Nevada, {USA}},
  pages     = {61--70},
  year      = {2010},
  crossref  = {DBLP:conf/focs/2010},
  url       = {https://doi.org/10.1109/FOCS.2010.85},
  doi       = {10.1109/FOCS.2010.85},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/focs/HardtR10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/DworkNPRY10,
  author    = {Cynthia Dwork and
               Moni Naor and
               Toniann Pitassi and
               Guy N. Rothblum and
               Sergey Yekhanin},
  title     = {Pan-Private Streaming Algorithms},
  booktitle = {Innovations in Computer Science - {ICS} 2010, Tsinghua University,
               Beijing, China, January 5-7, 2010. Proceedings},
  pages     = {66--80},
  year      = {2010},
  crossref  = {DBLP:conf/innovations/2010},
  url       = {http://conference.itcs.tsinghua.edu.cn/ICS2010/content/papers/6.html},
  timestamp = {Mon, 27 Sep 2010 12:57:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/innovations/DworkNPRY10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/DworkNPR10,
  author    = {Cynthia Dwork and
               Moni Naor and
               Toniann Pitassi and
               Guy N. Rothblum},
  title     = {Differential privacy under continual observation},
  booktitle = {Proceedings of the 42nd {ACM} Symposium on Theory of Computing, {STOC}
               2010, Cambridge, Massachusetts, USA, 5-8 June 2010},
  pages     = {715--724},
  year      = {2010},
  crossref  = {DBLP:conf/stoc/2010},
  url       = {https://doi.org/10.1145/1806689.1806787},
  doi       = {10.1145/1806689.1806787},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/stoc/DworkNPR10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CanettiRV10,
  author    = {Ran Canetti and
               Guy N. Rothblum and
               Mayank Varia},
  title     = {Obfuscation of Hyperplane Membership},
  booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
               2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  pages     = {72--89},
  year      = {2010},
  crossref  = {DBLP:conf/tcc/2010},
  url       = {https://doi.org/10.1007/978-3-642-11799-2\_5},
  doi       = {10.1007/978-3-642-11799-2\_5},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/CanettiRV10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FaustKPR10,
  author    = {Sebastian Faust and
               Eike Kiltz and
               Krzysztof Pietrzak and
               Guy N. Rothblum},
  title     = {Leakage-Resilient Signatures},
  booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
               2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  pages     = {343--360},
  year      = {2010},
  crossref  = {DBLP:conf/tcc/2010},
  url       = {https://doi.org/10.1007/978-3-642-11799-2\_21},
  doi       = {10.1007/978-3-642-11799-2\_21},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/FaustKPR10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/DvirGRV10,
  author    = {Zeev Dvir and
               Dan Gutfreund and
               Guy N. Rothblum and
               Salil P. Vadhan},
  title     = {On Approximating the Entropy of Polynomial Mappings},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {17},
  pages     = {160},
  year      = {2010},
  url       = {http://eccc.hpi-web.de/report/2010/160},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eccc/DvirGRV10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ndltd/Rothblum09,
  author    = {Guy N. Rothblum},
  title     = {Delegating computation reliably: paradigms and constructions},
  school    = {Massachusetts Institute of Technology, Cambridge, MA, {USA}},
  year      = {2009},
  url       = {http://hdl.handle.net/1721.1/54637},
  timestamp = {Wed, 10 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/phd/ndltd/Rothblum09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/NaorR09,
  author    = {Moni Naor and
               Guy N. Rothblum},
  title     = {The complexity of online memory checking},
  journal   = {J. {ACM}},
  volume    = {56},
  number    = {1},
  pages     = {2:1--2:46},
  year      = {2009},
  url       = {https://doi.org/10.1145/1462153.1462155},
  doi       = {10.1145/1462153.1462155},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jacm/NaorR09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mst/GradwohlNPR09,
  author    = {Ronen Gradwohl and
               Moni Naor and
               Benny Pinkas and
               Guy N. Rothblum},
  title     = {Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions
               of Sudoku Puzzles},
  journal   = {Theory Comput. Syst.},
  volume    = {44},
  number    = {2},
  pages     = {245--268},
  year      = {2009},
  url       = {https://doi.org/10.1007/s00224-008-9119-9},
  doi       = {10.1007/s00224-008-9119-9},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/mst/GradwohlNPR09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coco/RothblumV09,
  author    = {Guy N. Rothblum and
               Salil P. Vadhan},
  title     = {Are PCPs Inherent in Efficient Arguments?},
  booktitle = {Proceedings of the 24th Annual {IEEE} Conference on Computational
               Complexity, {CCC} 2009, Paris, France, 15-18 July 2009},
  pages     = {81--92},
  year      = {2009},
  crossref  = {DBLP:conf/coco/2009},
  url       = {https://doi.org/10.1109/CCC.2009.40},
  doi       = {10.1109/CCC.2009.40},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/coco/RothblumV09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/DworkNRRV09,
  author    = {Cynthia Dwork and
               Moni Naor and
               Omer Reingold and
               Guy N. Rothblum and
               Salil P. Vadhan},
  title     = {On the complexity of differentially private data release: efficient
               algorithms and hardness results},
  booktitle = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing,
               {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009},
  pages     = {381--390},
  year      = {2009},
  crossref  = {DBLP:conf/stoc/2009},
  url       = {https://doi.org/10.1145/1536414.1536467},
  doi       = {10.1145/1536414.1536467},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/stoc/DworkNRRV09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DworkNRV09,
  author    = {Cynthia Dwork and
               Moni Naor and
               Guy N. Rothblum and
               Vinod Vaikuntanathan},
  title     = {How Efficient Can Memory Checking Be?},
  booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
               2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  pages     = {503--520},
  year      = {2009},
  crossref  = {DBLP:conf/tcc/2009},
  url       = {https://doi.org/10.1007/978-3-642-00457-5\_30},
  doi       = {10.1007/978-3-642-00457-5\_30},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/DworkNRV09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BrakerskiGRV09,
  author    = {Zvika Brakerski and
               Shafi Goldwasser and
               Guy N. Rothblum and
               Vinod Vaikuntanathan},
  title     = {Weak Verifiable Random Functions},
  booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
               2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  pages     = {558--576},
  year      = {2009},
  crossref  = {DBLP:conf/tcc/2009},
  url       = {https://doi.org/10.1007/978-3-642-00457-5\_33},
  doi       = {10.1007/978-3-642-00457-5\_33},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/BrakerskiGRV09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/RothblumV09,
  author    = {Guy N. Rothblum and
               Salil P. Vadhan},
  title     = {Are PCPs Inherent in Efficient Arguments?},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {16},
  pages     = {89},
  year      = {2009},
  url       = {http://eccc.hpi-web.de/report/2009/089},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eccc/RothblumV09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustKPR09,
  author    = {Sebastian Faust and
               Eike Kiltz and
               Krzysztof Pietrzak and
               Guy N. Rothblum},
  title     = {Leakage-Resilient Signatures},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {282},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/282},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/FaustKPR09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/approx/GutfreundR08,
  author    = {Dan Gutfreund and
               Guy N. Rothblum},
  title     = {The Complexity of Local List Decoding},
  booktitle = {Approximation, Randomization and Combinatorial Optimization. Algorithms
               and Techniques, 11th International Workshop, {APPROX} 2008, and 12th
               International Workshop, {RANDOM} 2008, Boston, MA, USA, August 25-27,
               2008. Proceedings},
  pages     = {455--468},
  year      = {2008},
  crossref  = {DBLP:conf/approx/2008},
  url       = {https://doi.org/10.1007/978-3-540-85363-3\_36},
  doi       = {10.1007/978-3-540-85363-3\_36},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/approx/GutfreundR08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoldwasserKR08,
  author    = {Shafi Goldwasser and
               Yael Tauman Kalai and
               Guy N. Rothblum},
  title     = {One-Time Programs},
  booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
               Proceedings},
  pages     = {39--56},
  year      = {2008},
  crossref  = {DBLP:conf/crypto/2008},
  url       = {https://doi.org/10.1007/978-3-540-85174-5\_3},
  doi       = {10.1007/978-3-540-85174-5\_3},
  timestamp = {Wed, 14 Jun 2017 15:21:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/GoldwasserKR08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GoldwasserKR08,
  author    = {Shafi Goldwasser and
               Yael Tauman Kalai and
               Guy N. Rothblum},
  title     = {Delegating computation: interactive proofs for muggles},
  booktitle = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing,
               Victoria, British Columbia, Canada, May 17-20, 2008},
  pages     = {113--122},
  year      = {2008},
  crossref  = {DBLP:conf/stoc/2008},
  url       = {https://doi.org/10.1145/1374376.1374396},
  doi       = {10.1145/1374376.1374396},
  timestamp = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/stoc/GoldwasserKR08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GoldwasserGHKR08,
  author    = {Shafi Goldwasser and
               Dan Gutfreund and
               Alexander Healy and
               Tali Kaufman and
               Guy N. Rothblum},
  title     = {A (de)constructive approach to program checking},
  booktitle = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing,
               Victoria, British Columbia, Canada, May 17-20, 2008},
  pages     = {143--152},
  year      = {2008},
  crossref  = {DBLP:conf/stoc/2008},
  url       = {https://doi.org/10.1145/1374376.1374399},
  doi       = {10.1145/1374376.1374399},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/stoc/GoldwasserGHKR08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GutfreundR08,
  author    = {Dan Gutfreund and
               Guy N. Rothblum},
  title     = {The Complexity of Local List Decoding},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {15},
  number    = {034},
  year      = {2008},
  url       = {http://eccc.hpi-web.de/eccc-reports/2008/TR08-034/index.html},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eccc/GutfreundR08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fun/GradwohlNPR07,
  author    = {Ronen Gradwohl and
               Moni Naor and
               Benny Pinkas and
               Guy N. Rothblum},
  title     = {Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions
               of Sudoku Puzzles},
  booktitle = {Fun with Algorithms, 4th International Conference, {FUN} 2007, Castiglioncello,
               Italy, June 3-5, 2007, Proceedings},
  pages     = {166--182},
  year      = {2007},
  crossref  = {DBLP:conf/fun/2007},
  url       = {https://doi.org/10.1007/978-3-540-72914-3\_16},
  doi       = {10.1007/978-3-540-72914-3\_16},
  timestamp = {Wed, 14 Nov 2018 10:58:21 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fun/GradwohlNPR07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GoldwasserGHKR07,
  author    = {Shafi Goldwasser and
               Dan Gutfreund and
               Alexander Healy and
               Tali Kaufman and
               Guy N. Rothblum},
  title     = {Verifying and decoding in constant depth},
  booktitle = {Proceedings of the 39th Annual {ACM} Symposium on Theory of Computing,
               San Diego, California, USA, June 11-13, 2007},
  pages     = {440--449},
  year      = {2007},
  crossref  = {DBLP:conf/stoc/2007},
  url       = {https://doi.org/10.1145/1250790.1250855},
  doi       = {10.1145/1250790.1250855},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/stoc/GoldwasserGHKR07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoldwasserR07,
  author    = {Shafi Goldwasser and
               Guy N. Rothblum},
  title     = {On Best-Possible Obfuscation},
  booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
               2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  pages     = {194--213},
  year      = {2007},
  crossref  = {DBLP:conf/tcc/2007},
  url       = {https://doi.org/10.1007/978-3-540-70936-7\_11},
  doi       = {10.1007/978-3-540-70936-7\_11},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/GoldwasserR07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HohenbergerRSV07,
  author    = {Susan Hohenberger and
               Guy N. Rothblum and
               Abhi Shelat and
               Vinod Vaikuntanathan},
  title     = {Securely Obfuscating Re-encryption},
  booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
               2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  pages     = {233--252},
  year      = {2007},
  crossref  = {DBLP:conf/tcc/2007},
  url       = {https://doi.org/10.1007/978-3-540-70936-7\_13},
  doi       = {10.1007/978-3-540-70936-7\_13},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/HohenbergerRSV07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GoldwasserGHKR07,
  author    = {Shafi Goldwasser and
               Dan Gutfreund and
               Alexander Healy and
               Tali Kaufman and
               Guy N. Rothblum},
  title     = {A (De)constructive Approach to Program Checking},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {14},
  number    = {047},
  year      = {2007},
  url       = {http://eccc.hpi-web.de/eccc-reports/2007/TR07-047/index.html},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eccc/GoldwasserGHKR07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/NaorR06,
  author    = {Moni Naor and
               Guy N. Rothblum},
  title     = {Learning to impersonate},
  booktitle = {Machine Learning, Proceedings of the Twenty-Third International Conference
               {(ICML} 2006), Pittsburgh, Pennsylvania, USA, June 25-29, 2006},
  pages     = {649--656},
  year      = {2006},
  crossref  = {DBLP:conf/icml/2006},
  url       = {https://doi.org/10.1145/1143844.1143926},
  doi       = {10.1145/1143844.1143926},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icml/NaorR06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/NaorR06,
  author    = {Moni Naor and
               Guy N. Rothblum},
  title     = {The Complexity of Online Memory Checking},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {13},
  number    = {034},
  year      = {2006},
  url       = {http://eccc.hpi-web.de/eccc-reports/2006/TR06-034/index.html},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eccc/NaorR06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorR06,
  author    = {Moni Naor and
               Guy N. Rothblum},
  title     = {The Complexity of Online Memory Checking},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {91},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/091},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/NaorR06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/NaorR05,
  author    = {Moni Naor and
               Guy N. Rothblum},
  title     = {The Complexity of Online Memory Checking},
  booktitle = {46th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS}
               2005), 23-25 October 2005, Pittsburgh, PA, USA, Proceedings},
  pages     = {573--584},
  year      = {2005},
  crossref  = {DBLP:conf/focs/2005},
  url       = {https://doi.org/10.1109/SFCS.2005.71},
  doi       = {10.1109/SFCS.2005.71},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/focs/NaorR05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR04-085,
  author    = {Erez Petrank and
               Guy N. Rothblum},
  title     = {Selection from Structured Data Sets},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  number    = {085},
  year      = {2004},
  url       = {http://eccc.hpi-web.de/eccc-reports/2004/TR04-085/index.html},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eccc/ECCC-TR04-085},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/soda/2019,
  editor    = {Timothy M. Chan},
  title     = {Proceedings of the Thirtieth Annual {ACM-SIAM} Symposium on Discrete
               Algorithms, {SODA} 2019, San Diego, California, USA, January 6-9,
               2019},
  publisher = {{SIAM}},
  year      = {2019},
  url       = {https://doi.org/10.1137/1.9781611975482},
  doi       = {10.1137/1.9781611975482},
  isbn      = {978-1-61197-548-2},
  timestamp = {Tue, 12 Mar 2019 15:52:39 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/soda/2019},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/coco/2018,
  editor    = {Rocco A. Servedio},
  title     = {33rd Computational Complexity Conference, {CCC} 2018, June 22-24,
               2018, San Diego, CA, {USA}},
  series    = {LIPIcs},
  volume    = {102},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik},
  year      = {2018},
  url       = {http://www.dagstuhl.de/dagpub/978-3-95977-069-9},
  isbn      = {978-3-95977-069-9},
  timestamp = {Mon, 04 Jun 2018 18:10:04 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/coco/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/focs/2018,
  editor    = {Mikkel Thorup},
  title     = {59th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
               2018, Paris, France, October 7-9, 2018},
  publisher = {{IEEE} Computer Society},
  year      = {2018},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8554191},
  isbn      = {978-1-5386-4230-6},
  timestamp = {Tue, 04 Dec 2018 10:32:10 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/focs/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icml/2018,
  editor    = {Jennifer G. Dy and
               Andreas Krause},
  title     = {Proceedings of the 35th International Conference on Machine Learning,
               {ICML} 2018, Stockholmsm{\"{a}}ssan, Stockholm, Sweden, July
               10-15, 2018},
  series    = {Proceedings of Machine Learning Research},
  volume    = {80},
  publisher = {{PMLR}},
  year      = {2018},
  url       = {http://proceedings.mlr.press/v80/},
  timestamp = {Wed, 03 Apr 2019 18:17:30 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icml/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/innovations/2018,
  editor    = {Anna R. Karlin},
  title     = {9th Innovations in Theoretical Computer Science Conference, {ITCS}
               2018, January 11-14, 2018, Cambridge, MA, {USA}},
  series    = {LIPIcs},
  volume    = {94},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik},
  year      = {2018},
  url       = {http://www.dagstuhl.de/dagpub/978-3-95977-060-6},
  isbn      = {978-3-95977-060-6},
  timestamp = {Fri, 12 Jan 2018 16:04:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/innovations/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nips/2018,
  editor    = {Samy Bengio and
               Hanna M. Wallach and
               Hugo Larochelle and
               Kristen Grauman and
               Nicol{\`{o}} Cesa{-}Bianchi and
               Roman Garnett},
  title     = {Advances in Neural Information Processing Systems 31: Annual Conference
               on Neural Information Processing Systems 2018, NeurIPS 2018, 3-8 December
               2018, Montr{\'{e}}al, Canada},
  year      = {2018},
  url       = {http://papers.nips.cc/book/advances-in-neural-information-processing-systems-31-2018},
  timestamp = {Sun, 16 Dec 2018 17:30:05 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/nips/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stoc/2018,
  editor    = {Ilias Diakonikolas and
               David Kempe and
               Monika Henzinger},
  title     = {Proceedings of the 50th Annual {ACM} {SIGACT} Symposium on Theory
               of Computing, {STOC} 2018, Los Angeles, CA, USA, June 25-29, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {http://dl.acm.org/citation.cfm?id=3188745},
  timestamp = {Thu, 21 Jun 2018 08:21:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stoc/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2017-2,
  editor    = {Jonathan Katz and
               Hovav Shacham},
  title     = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
               Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10402},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-63715-0},
  doi       = {10.1007/978-3-319-63715-0},
  isbn      = {978-3-319-63714-3},
  timestamp = {Mon, 14 Aug 2017 14:37:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2017-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2017-2,
  editor    = {Yael Kalai and
               Leonid Reyzin},
  title     = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
               Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10678},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-70503-3},
  doi       = {10.1007/978-3-319-70503-3},
  isbn      = {978-3-319-70502-6},
  timestamp = {Tue, 07 Nov 2017 12:38:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2017-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2016-3,
  editor    = {Matthew Robshaw and
               Jonathan Katz},
  title     = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9816},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53015-3},
  doi       = {10.1007/978-3-662-53015-3},
  isbn      = {978-3-662-53014-6},
  timestamp = {Fri, 26 May 2017 00:50:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2016-3},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stoc/2016,
  editor    = {Daniel Wichs and
               Yishay Mansour},
  title     = {Proceedings of the 48th Annual {ACM} {SIGACT} Symposium on Theory
               of Computing, {STOC} 2016, Cambridge, MA, USA, June 18-21, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2897518},
  isbn      = {978-1-4503-4132-5},
  timestamp = {Fri, 10 Jun 2016 10:30:30 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stoc/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2015-2,
  editor    = {Tetsu Iwata and
               Jung Hee Cheon},
  title     = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9453},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48800-3},
  doi       = {10.1007/978-3-662-48800-3},
  isbn      = {978-3-662-48799-0},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2015-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2014-1,
  editor    = {Javier Esparza and
               Pierre Fraigniaud and
               Thore Husfeldt and
               Elias Koutsoupias},
  title     = {Automata, Languages, and Programming - 41st International Colloquium,
               {ICALP} 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part
               {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8572},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-43948-7},
  doi       = {10.1007/978-3-662-43948-7},
  isbn      = {978-3-662-43947-0},
  timestamp = {Tue, 23 May 2017 01:08:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icalp/2014-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/innovations/2014,
  editor    = {Moni Naor},
  title     = {Innovations in Theoretical Computer Science, ITCS'14, Princeton, NJ,
               USA, January 12-14, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2554797},
  isbn      = {978-1-4503-2698-8},
  timestamp = {Fri, 14 Feb 2014 17:36:37 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/innovations/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2014,
  editor    = {Yehuda Lindell},
  title     = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
               2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8349},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-54242-8},
  doi       = {10.1007/978-3-642-54242-8},
  isbn      = {978-3-642-54241-1},
  timestamp = {Fri, 02 Nov 2018 09:44:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2013-2,
  editor    = {Ran Canetti and
               Juan A. Garay},
  title     = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8043},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40084-1},
  doi       = {10.1007/978-3-642-40084-1},
  isbn      = {978-3-642-40083-4},
  timestamp = {Fri, 26 May 2017 00:50:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2013-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stoc/2013,
  editor    = {Dan Boneh and
               Tim Roughgarden and
               Joan Feigenbaum},
  title     = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA,
               USA, June 1-4, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2488608},
  isbn      = {978-1-4503-2029-0},
  timestamp = {Sun, 26 May 2013 10:30:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stoc/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2012,
  editor    = {Reihaneh Safavi{-}Naini and
               Ran Canetti},
  title     = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7417},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-32009-5},
  doi       = {10.1007/978-3-642-32009-5},
  isbn      = {978-3-642-32008-8},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/focs/2012,
  title     = {53rd Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
               2012, New Brunswick, NJ, USA, October 20-23, 2012},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6374356},
  isbn      = {978-1-4673-4383-1},
  timestamp = {Mon, 15 Dec 2014 18:48:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/focs/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icits/2012,
  editor    = {Adam D. Smith},
  title     = {Information Theoretic Security - 6th International Conference, {ICITS}
               2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7412},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-32284-6},
  doi       = {10.1007/978-3-642-32284-6},
  isbn      = {978-3-642-32283-9},
  timestamp = {Wed, 17 May 2017 10:54:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icits/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/soda/2012,
  editor    = {Yuval Rabani},
  title     = {Proceedings of the Twenty-Third Annual {ACM-SIAM} Symposium on Discrete
               Algorithms, {SODA} 2012, Kyoto, Japan, January 17-19, 2012},
  publisher = {{SIAM}},
  year      = {2012},
  url       = {https://doi.org/10.1137/1.9781611973099},
  doi       = {10.1137/1.9781611973099},
  isbn      = {978-1-61197-210-8},
  timestamp = {Wed, 24 May 2017 08:31:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/soda/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2011,
  editor    = {Dong Hoon Lee and
               Xiaoyun Wang},
  title     = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Seoul, South Korea, December 4-8, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7073},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25385-0},
  doi       = {10.1007/978-3-642-25385-0},
  isbn      = {978-3-642-25384-3},
  timestamp = {Wed, 10 Jan 2018 08:32:22 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2011,
  editor    = {Yan Chen and
               George Danezis and
               Vitaly Shmatikov},
  title     = {Proceedings of the 18th {ACM} Conference on Computer and Communications
               Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-0948-6},
  timestamp = {Thu, 20 Oct 2011 19:38:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/innovations/2011,
  editor    = {Bernard Chazelle},
  title     = {Innovations in Computer Science - {ICS} 2010, Tsinghua University,
               Beijing, China, January 7-9, 2011. Proceedings},
  publisher = {Tsinghua University Press},
  year      = {2011},
  isbn      = {978-7-302-24517-9},
  timestamp = {Wed, 19 Oct 2011 15:40:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/innovations/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2010,
  editor    = {Tal Rabin},
  title     = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6223},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14623-7},
  doi       = {10.1007/978-3-642-14623-7},
  isbn      = {978-3-642-14622-0},
  timestamp = {Fri, 26 May 2017 00:50:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/focs/2010,
  title     = {51th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
               2010, October 23-26, 2010, Las Vegas, Nevada, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5669376},
  isbn      = {978-0-7695-4244-7},
  timestamp = {Mon, 15 Dec 2014 18:48:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/focs/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/innovations/2010,
  editor    = {Andrew Chi{-}Chih Yao},
  title     = {Innovations in Computer Science - {ICS} 2010, Tsinghua University,
               Beijing, China, January 5-7, 2010. Proceedings},
  publisher = {Tsinghua University Press},
  year      = {2010},
  isbn      = {978-7-302-21752-7},
  timestamp = {Mon, 27 Sep 2010 12:57:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/innovations/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stoc/2010,
  editor    = {Leonard J. Schulman},
  title     = {Proceedings of the 42nd {ACM} Symposium on Theory of Computing, {STOC}
               2010, Cambridge, Massachusetts, USA, 5-8 June 2010},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-4503-0050-6},
  timestamp = {Fri, 12 Oct 2012 12:16:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stoc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2010,
  editor    = {Daniele Micciancio},
  title     = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
               2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5978},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-11799-2},
  doi       = {10.1007/978-3-642-11799-2},
  isbn      = {978-3-642-11798-5},
  timestamp = {Tue, 23 May 2017 01:06:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/coco/2009,
  title     = {Proceedings of the 24th Annual {IEEE} Conference on Computational
               Complexity, {CCC} 2009, Paris, France, 15-18 July 2009},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5231175},
  isbn      = {978-0-7695-3717-7},
  timestamp = {Fri, 13 May 2016 10:27:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/coco/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stoc/2009,
  editor    = {Michael Mitzenmacher},
  title     = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing,
               {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-506-2},
  timestamp = {Fri, 05 Jun 2009 09:31:27 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stoc/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2009,
  editor    = {Omer Reingold},
  title     = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
               2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5444},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-00457-5},
  doi       = {10.1007/978-3-642-00457-5},
  isbn      = {978-3-642-00456-8},
  timestamp = {Tue, 23 May 2017 01:06:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/approx/2008,
  editor    = {Ashish Goel and
               Klaus Jansen and
               Jos{\'{e}} D. P. Rolim and
               Ronitt Rubinfeld},
  title     = {Approximation, Randomization and Combinatorial Optimization. Algorithms
               and Techniques, 11th International Workshop, {APPROX} 2008, and 12th
               International Workshop, {RANDOM} 2008, Boston, MA, USA, August 25-27,
               2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5171},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-85363-3},
  doi       = {10.1007/978-3-540-85363-3},
  isbn      = {978-3-540-85362-6},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/approx/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2008,
  editor    = {David A. Wagner},
  title     = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5157},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-85174-5},
  doi       = {10.1007/978-3-540-85174-5},
  isbn      = {978-3-540-85173-8},
  timestamp = {Wed, 14 Jun 2017 15:21:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stoc/2008,
  editor    = {Cynthia Dwork},
  title     = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing,
               Victoria, British Columbia, Canada, May 17-20, 2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-60558-047-0},
  timestamp = {Sat, 19 Jun 2010 14:44:24 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stoc/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fun/2007,
  editor    = {Pierluigi Crescenzi and
               Giuseppe Prencipe and
               Geppino Pucci},
  title     = {Fun with Algorithms, 4th International Conference, {FUN} 2007, Castiglioncello,
               Italy, June 3-5, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4475},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-72914-3},
  doi       = {10.1007/978-3-540-72914-3},
  isbn      = {978-3-540-72913-6},
  timestamp = {Wed, 14 Nov 2018 10:58:21 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fun/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stoc/2007,
  editor    = {David S. Johnson and
               Uriel Feige},
  title     = {Proceedings of the 39th Annual {ACM} Symposium on Theory of Computing,
               San Diego, California, USA, June 11-13, 2007},
  publisher = {{ACM}},
  year      = {2007},
  isbn      = {978-1-59593-631-8},
  timestamp = {Wed, 13 Jun 2007 12:33:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stoc/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2007,
  editor    = {Salil P. Vadhan},
  title     = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
               2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4392},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-70936-7},
  doi       = {10.1007/978-3-540-70936-7},
  isbn      = {3-540-70935-5},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icml/2006,
  editor    = {William W. Cohen and
               Andrew Moore},
  title     = {Machine Learning, Proceedings of the Twenty-Third International Conference
               {(ICML} 2006), Pittsburgh, Pennsylvania, USA, June 25-29, 2006},
  series    = {{ACM} International Conference Proceeding Series},
  volume    = {148},
  publisher = {{ACM}},
  year      = {2006},
  isbn      = {1-59593-383-2},
  timestamp = {Mon, 22 Oct 2007 13:47:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icml/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/focs/2005,
  title     = {46th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS}
               2005), 23-25 October 2005, Pittsburgh, PA, USA, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10244},
  isbn      = {0-7695-2468-0},
  timestamp = {Mon, 15 Dec 2014 18:48:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/focs/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier