Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Adam D. Smith
@article{DBLP:journals/ncs/0001SC23, author = {Da Yan and Adam D. Smith and Cheng{-}Chien Chen}, title = {Structure prediction and materials design with generative neural networks}, journal = {Nat. Comput. Sci.}, volume = {3}, number = {7}, pages = {572--574}, year = {2023}, url = {https://doi.org/10.1038/s43588-023-00471-w}, doi = {10.1038/S43588-023-00471-W}, timestamp = {Fri, 05 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ncs/0001SC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CohenSSV23, author = {Aloni Cohen and Adam D. Smith and Marika Swanberg and Prashant Nalini Vasudevan}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Control, Confidentiality, and the Right to be Forgotten}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {3358--3372}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3616585}, doi = {10.1145/3576915.3616585}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CohenSSV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colt/BrownHS23, author = {Gavin Brown and Samuel B. Hopkins and Adam D. Smith}, editor = {Gergely Neu and Lorenzo Rosasco}, title = {Fast, Sample-Efficient, Affine-Invariant Private Mean and Covariance Estimation for Subgaussian Distributions}, booktitle = {The Thirty Sixth Annual Conference on Learning Theory, {COLT} 2023, 12-15 July 2023, Bangalore, India}, series = {Proceedings of Machine Learning Research}, volume = {195}, pages = {5578--5579}, publisher = {{PMLR}}, year = {2023}, url = {https://proceedings.mlr.press/v195/brown23a.html}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colt/BrownHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/EdenLRS23, author = {Talya Eden and Quanquan C. Liu and Sofya Raskhodnikova and Adam D. Smith}, editor = {Kousha Etessami and Uriel Feige and Gabriele Puppis}, title = {Triangle Counting with Local Edge Differential Privacy}, booktitle = {50th International Colloquium on Automata, Languages, and Programming, {ICALP} 2023, July 10-14, 2023, Paderborn, Germany}, series = {LIPIcs}, volume = {261}, pages = {52:1--52:21}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2023}, url = {https://doi.org/10.4230/LIPIcs.ICALP.2023.52}, doi = {10.4230/LIPICS.ICALP.2023.52}, timestamp = {Wed, 05 Jul 2023 16:19:52 +0200}, biburl = {https://dblp.org/rec/conf/icalp/EdenLRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/0004RSS23, author = {Palak Jain and Sofya Raskhodnikova and Satchit Sivakumar and Adam D. Smith}, editor = {Andreas Krause and Emma Brunskill and Kyunghyun Cho and Barbara Engelhardt and Sivan Sabato and Jonathan Scarlett}, title = {The Price of Differential Privacy under Continual Observation}, booktitle = {International Conference on Machine Learning, {ICML} 2023, 23-29 July 2023, Honolulu, Hawaii, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {202}, pages = {14654--14678}, publisher = {{PMLR}}, year = {2023}, url = {https://proceedings.mlr.press/v202/jain23b.html}, timestamp = {Mon, 28 Aug 2023 17:23:08 +0200}, biburl = {https://dblp.org/rec/conf/icml/0004RSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/0004KRSS23, author = {Palak Jain and Iden Kalemaj and Sofya Raskhodnikova and Satchit Sivakumar and Adam D. Smith}, editor = {Alice Oh and Tristan Naumann and Amir Globerson and Kate Saenko and Moritz Hardt and Sergey Levine}, title = {Counting Distinct Elements in the Turnstile Model with Differential Privacy under Continual Observation}, booktitle = {Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023}, year = {2023}, url = {http://papers.nips.cc/paper\_files/paper/2023/hash/0ef1afa0daa888d695dcd5e9513bafa3-Abstract-Conference.html}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/0004KRSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pods/KalemajRST23, author = {Iden Kalemaj and Sofya Raskhodnikova and Adam D. Smith and Charalampos E. Tsourakakis}, editor = {Floris Geerts and Hung Q. Ngo and Stavros Sintos}, title = {Node-Differentially Private Estimation of the Number of Connected Components}, booktitle = {Proceedings of the 42nd {ACM} {SIGMOD-SIGACT-SIGAI} Symposium on Principles of Database Systems, {PODS} 2023, Seattle, WA, USA, June 18-23, 2023}, pages = {183--194}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3584372.3588671}, doi = {10.1145/3584372.3588671}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pods/KalemajRST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/approx/2023, editor = {Nicole Megow and Adam D. Smith}, title = {Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, {APPROX/RANDOM} 2023, September 11-13, 2023, Atlanta, Georgia, {USA}}, series = {LIPIcs}, volume = {275}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2023}, url = {https://www.dagstuhl.de/dagpub/978-3-95977-296-9}, isbn = {978-3-95977-296-9}, timestamp = {Sat, 09 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/approx/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-12250, author = {Gavin Brown and Samuel B. Hopkins and Adam D. Smith}, title = {Fast, Sample-Efficient, Affine-Invariant Private Mean and Covariance Estimation for Subgaussian Distributions}, journal = {CoRR}, volume = {abs/2301.12250}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.12250}, doi = {10.48550/ARXIV.2301.12250}, eprinttype = {arXiv}, eprint = {2301.12250}, timestamp = {Tue, 25 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-12250.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-05890, author = {Iden Kalemaj and Sofya Raskhodnikova and Adam D. Smith and Charalampos E. Tsourakakis}, title = {Node-Differentially Private Estimation of the Number of Connected Components}, journal = {CoRR}, volume = {abs/2304.05890}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.05890}, doi = {10.48550/ARXIV.2304.05890}, eprinttype = {arXiv}, eprint = {2304.05890}, timestamp = {Wed, 19 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-05890.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-02263, author = {Talya Eden and Quanquan C. Liu and Sofya Raskhodnikova and Adam D. Smith}, title = {Triangle Counting with Local Edge Differential Privacy}, journal = {CoRR}, volume = {abs/2305.02263}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.02263}, doi = {10.48550/ARXIV.2305.02263}, eprinttype = {arXiv}, eprint = {2305.02263}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-02263.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-06723, author = {Palak Jain and Iden Kalemaj and Sofya Raskhodnikova and Satchit Sivakumar and Adam D. Smith}, title = {Counting Distinct Elements in the Turnstile Model with Differential Privacy under Continual Observation}, journal = {CoRR}, volume = {abs/2306.06723}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.06723}, doi = {10.48550/ARXIV.2306.06723}, eprinttype = {arXiv}, eprint = {2306.06723}, timestamp = {Fri, 16 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-06723.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/AlabiMSSV22, author = {Daniel Alabi and Audra McMillan and Jayshree Sarathy and Adam D. Smith and Salil P. Vadhan}, title = {Differentially Private Simple Linear Regression}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {2}, pages = {184--204}, year = {2022}, url = {https://doi.org/10.2478/popets-2022-0041}, doi = {10.2478/POPETS-2022-0041}, timestamp = {Sat, 12 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/AlabiMSSV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colt/BrownBS22, author = {Gavin Brown and Mark Bun and Adam D. Smith}, editor = {Po{-}Ling Loh and Maxim Raginsky}, title = {Strong Memory Lower Bounds for Learning Natural Models}, booktitle = {Conference on Learning Theory, 2-5 July 2022, London, {UK}}, series = {Proceedings of Machine Learning Research}, volume = {178}, pages = {4989--5029}, publisher = {{PMLR}}, year = {2022}, url = {https://proceedings.mlr.press/v178/brown22a.html}, timestamp = {Tue, 25 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colt/BrownBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/DenisovMRST22, author = {Sergey Denisov and H. Brendan McMahan and John Rush and Adam D. Smith and Abhradeep Guha Thakurta}, editor = {Sanmi Koyejo and S. Mohamed and A. Agarwal and Danielle Belgrave and K. Cho and A. Oh}, title = {Improved Differential Privacy for {SGD} via Optimal Private Linear Operators on Adaptive Streams}, booktitle = {Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans, LA, USA, November 28 - December 9, 2022}, year = {2022}, url = {http://papers.nips.cc/paper\_files/paper/2022/hash/271ec4d1a9ff5e6b81a6e21d38b1ba96-Abstract-Conference.html}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/DenisovMRST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-04743, author = {Gavin Brown and Mark Bun and Adam D. Smith}, title = {Strong Memory Lower Bounds for Learning Natural Models}, journal = {CoRR}, volume = {abs/2206.04743}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.04743}, doi = {10.48550/ARXIV.2206.04743}, eprinttype = {arXiv}, eprint = {2206.04743}, timestamp = {Tue, 25 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-04743.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-07876, author = {Aloni Cohen and Adam D. Smith and Marika Swanberg and Prashant Nalini Vasudevan}, title = {Control, Confidentiality, and the Right to be Forgotten}, journal = {CoRR}, volume = {abs/2210.07876}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.07876}, doi = {10.48550/ARXIV.2210.07876}, eprinttype = {arXiv}, eprint = {2210.07876}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-07876.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-15819, author = {Audra McMillan and Adam D. Smith and Jonathan R. Ullman}, title = {Instance-Optimal Differentially Private Estimation}, journal = {CoRR}, volume = {abs/2210.15819}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.15819}, doi = {10.48550/ARXIV.2210.15819}, eprinttype = {arXiv}, eprint = {2210.15819}, timestamp = {Thu, 03 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-15819.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-17520, author = {Adam D. Smith and Abhradeep Thakurta}, title = {Fully Adaptive Composition for Gaussian Differential Privacy}, journal = {CoRR}, volume = {abs/2210.17520}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.17520}, doi = {10.48550/ARXIV.2210.17520}, eprinttype = {arXiv}, eprint = {2210.17520}, timestamp = {Thu, 03 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-17520.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-08193, author = {Sofya Raskhodnikova and Satchit Sivakumar and Adam D. Smith and Marika Swanberg}, title = {Differentially Private Sampling from Distributions}, journal = {CoRR}, volume = {abs/2211.08193}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.08193}, doi = {10.48550/ARXIV.2211.08193}, eprinttype = {arXiv}, eprint = {2211.08193}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-08193.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CanettiFPRS21, author = {Ran Canetti and Benjamin Fuller and Omer Paneth and Leonid Reyzin and Adam D. Smith}, title = {Reusable Fuzzy Extractors for Low-Entropy Distributions}, journal = {J. Cryptol.}, volume = {34}, number = {1}, pages = {2}, year = {2021}, url = {https://doi.org/10.1007/s00145-020-09367-8}, doi = {10.1007/S00145-020-09367-8}, timestamp = {Fri, 04 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/CanettiFPRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/CheuSU21, author = {Albert Cheu and Adam D. Smith and Jonathan R. Ullman}, title = {Manipulation Attacks in Local Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {11}, number = {1}, year = {2021}, url = {https://doi.org/10.29012/jpc.754}, doi = {10.29012/JPC.754}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/CheuSU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/BassilyNSSSU21, author = {Raef Bassily and Kobbi Nissim and Adam D. Smith and Thomas Steinke and Uri Stemmer and Jonathan R. Ullman}, title = {Algorithmic Stability for Adaptive Data Analysis}, journal = {{SIAM} J. Comput.}, volume = {50}, number = {3}, year = {2021}, url = {https://doi.org/10.1137/16M1103646}, doi = {10.1137/16M1103646}, timestamp = {Wed, 14 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/BassilyNSSSU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/ReyzinSY21, author = {Leonid Reyzin and Adam D. Smith and Sophia Yakoubov}, editor = {Shlomi Dolev and Oded Margalit and Benny Pinkas and Alexander A. Schwarzmann}, title = {Turning {HATE} into {LOVE:} Compact Homomorphic Ad Hoc Threshold Encryption for Scalable {MPC}}, booktitle = {Cyber Security Cryptography and Machine Learning - 5th International Symposium, {CSCML} 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12716}, pages = {361--378}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78086-9\_27}, doi = {10.1007/978-3-030-78086-9\_27}, timestamp = {Mon, 03 Jan 2022 22:32:47 +0100}, biburl = {https://dblp.org/rec/conf/cscml/ReyzinSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/BrownGSUZ21, author = {Gavin Brown and Marco Gaboardi and Adam D. Smith and Jonathan R. Ullman and Lydia Zakynthinou}, editor = {Marc'Aurelio Ranzato and Alina Beygelzimer and Yann N. Dauphin and Percy Liang and Jennifer Wortman Vaughan}, title = {Covariance-Aware Private Mean Estimation Without Private Covariance Estimation}, booktitle = {Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, NeurIPS 2021, December 6-14, 2021, virtual}, pages = {7950--7964}, year = {2021}, url = {https://proceedings.neurips.cc/paper/2021/hash/42778ef0b5805a96f9511e20b5611fce-Abstract.html}, timestamp = {Tue, 25 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nips/BrownGSUZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/RaskhodnikovaSS21, author = {Sofya Raskhodnikova and Satchit Sivakumar and Adam D. Smith and Marika Swanberg}, editor = {Marc'Aurelio Ranzato and Alina Beygelzimer and Yann N. Dauphin and Percy Liang and Jennifer Wortman Vaughan}, title = {Differentially Private Sampling from Distributions}, booktitle = {Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, NeurIPS 2021, December 6-14, 2021, virtual}, pages = {28983--28994}, year = {2021}, url = {https://proceedings.neurips.cc/paper/2021/hash/f2b5e92f61b6de923b063588ee6e7c48-Abstract.html}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nips/RaskhodnikovaSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/JainRSST21, author = {Prateek Jain and John Rush and Adam D. Smith and Shuang Song and Abhradeep Guha Thakurta}, editor = {Marc'Aurelio Ranzato and Alina Beygelzimer and Yann N. Dauphin and Percy Liang and Jennifer Wortman Vaughan}, title = {Differentially Private Model Personalization}, booktitle = {Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, NeurIPS 2021, December 6-14, 2021, virtual}, pages = {29723--29735}, year = {2021}, url = {https://proceedings.neurips.cc/paper/2021/hash/f8580959e35cb0934479bb007fb241c2-Abstract.html}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nips/JainRSST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CheuSU21, author = {Albert Cheu and Adam D. Smith and Jonathan R. Ullman}, title = {Manipulation Attacks in Local Differential Privacy}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {883--900}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00001}, doi = {10.1109/SP40001.2021.00001}, timestamp = {Thu, 21 Sep 2023 15:57:26 +0200}, biburl = {https://dblp.org/rec/conf/sp/CheuSU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BrownBFST21, author = {Gavin Brown and Mark Bun and Vitaly Feldman and Adam D. Smith and Kunal Talwar}, editor = {Samir Khuller and Virginia Vassilevska Williams}, title = {When is memorization of irrelevant training data necessary for high-accuracy learning?}, booktitle = {{STOC} '21: 53rd Annual {ACM} {SIGACT} Symposium on Theory of Computing, Virtual Event, Italy, June 21-25, 2021}, pages = {123--132}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3406325.3451131}, doi = {10.1145/3406325.3451131}, timestamp = {Tue, 25 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/BrownBFST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-10333, author = {J{\"{o}}rg Drechsler and Ira Globus{-}Harris and Audra McMillan and Jayshree Sarathy and Adam D. Smith}, title = {Non-parametric Differentially Private Confidence Intervals for the Median}, journal = {CoRR}, volume = {abs/2106.10333}, year = {2021}, url = {https://arxiv.org/abs/2106.10333}, eprinttype = {arXiv}, eprint = {2106.10333}, timestamp = {Tue, 29 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-10333.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-13329, author = {Gavin Brown and Marco Gaboardi and Adam D. Smith and Jonathan R. Ullman and Lydia Zakynthinou}, title = {Covariance-Aware Private Mean Estimation Without Private Covariance Estimation}, journal = {CoRR}, volume = {abs/2106.13329}, year = {2021}, url = {https://arxiv.org/abs/2106.13329}, eprinttype = {arXiv}, eprint = {2106.13329}, timestamp = {Tue, 25 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-13329.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-00828, author = {Palak Jain and Sofya Raskhodnikova and Satchit Sivakumar and Adam D. Smith}, title = {The Price of Differential Privacy under Continual Observation}, journal = {CoRR}, volume = {abs/2112.00828}, year = {2021}, url = {https://arxiv.org/abs/2112.00828}, eprinttype = {arXiv}, eprint = {2112.00828}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-00828.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmlr/0015GS020, author = {Di Wang and Marco Gaboardi and Adam D. Smith and Jinhui Xu}, title = {Empirical Risk Minimization in the Non-interactive Local Model of Differential Privacy}, journal = {J. Mach. Learn. Res.}, volume = {21}, pages = {200:1--200:39}, year = {2020}, url = {http://jmlr.org/papers/v21/19-253.html}, timestamp = {Tue, 12 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmlr/0015GS020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/FullerRS20, author = {Benjamin Fuller and Leonid Reyzin and Adam D. Smith}, title = {When Are Fuzzy Extractors Possible?}, journal = {{IEEE} Trans. Inf. Theory}, volume = {66}, number = {8}, pages = {5282--5298}, year = {2020}, url = {https://doi.org/10.1109/TIT.2020.2984751}, doi = {10.1109/TIT.2020.2984751}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/FullerRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aistats/00020SS0W20, author = {Ryan Rogers and Aaron Roth and Adam D. Smith and Nathan Srebro and Om Thakkar and Blake E. Woodworth}, editor = {Silvia Chiappa and Roberto Calandra}, title = {Guaranteed Validity for Empirical Approaches to Adaptive Data Analysis}, booktitle = {The 23rd International Conference on Artificial Intelligence and Statistics, {AISTATS} 2020, 26-28 August 2020, Online [Palermo, Sicily, Italy]}, series = {Proceedings of Machine Learning Research}, volume = {108}, pages = {2830--2840}, publisher = {{PMLR}}, year = {2020}, url = {http://proceedings.mlr.press/v108/rogers20a.html}, timestamp = {Mon, 29 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aistats/00020SS0W20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/Smith0T20, author = {Adam D. Smith and Shuang Song and Abhradeep Thakurta}, editor = {Hugo Larochelle and Marc'Aurelio Ranzato and Raia Hadsell and Maria{-}Florina Balcan and Hsuan{-}Tien Lin}, title = {The Flajolet-Martin Sketch Itself Preserves Differential Privacy: Private Counting with Minimal Space}, booktitle = {Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020, December 6-12, 2020, virtual}, year = {2020}, url = {https://proceedings.neurips.cc/paper/2020/hash/e3019767b1b23f82883c9850356b71d6-Abstract.html}, timestamp = {Tue, 19 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/Smith0T20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icits/2020, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://www.dagstuhl.de/dagpub/978-3-95977-151-1}, isbn = {978-3-95977-151-1}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-05157, author = {Daniel Alabi and Audra McMillan and Jayshree Sarathy and Adam D. Smith and Salil P. Vadhan}, title = {Differentially Private Simple Linear Regression}, journal = {CoRR}, volume = {abs/2007.05157}, year = {2020}, url = {https://arxiv.org/abs/2007.05157}, eprinttype = {arXiv}, eprint = {2007.05157}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-05157.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-05934, author = {Di Wang and Marco Gaboardi and Adam D. Smith and Jinhui Xu}, title = {Empirical Risk Minimization in the Non-interactive Local Model of Differential Privacy}, journal = {CoRR}, volume = {abs/2011.05934}, year = {2020}, url = {https://arxiv.org/abs/2011.05934}, eprinttype = {arXiv}, eprint = {2011.05934}, timestamp = {Tue, 12 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-05934.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-06421, author = {Gavin Brown and Mark Bun and Vitaly Feldman and Adam D. Smith and Kunal Talwar}, title = {When is Memorization of Irrelevant Training Data Necessary for High-Accuracy Learning?}, journal = {CoRR}, volume = {abs/2012.06421}, year = {2020}, url = {https://arxiv.org/abs/2012.06421}, eprinttype = {arXiv}, eprint = {2012.06421}, timestamp = {Tue, 25 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-06421.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/alt/WangS019, author = {Di Wang and Adam D. Smith and Jinhui Xu}, editor = {Aur{\'{e}}lien Garivier and Satyen Kale}, title = {Noninteractive Locally Private Learning of Linear Models via Polynomial Approximations}, booktitle = {Algorithmic Learning Theory, {ALT} 2019, 22-24 March 2019, Chicago, Illinois, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {98}, pages = {897--902}, publisher = {{PMLR}}, year = {2019}, url = {http://proceedings.mlr.press/v98/wang19c.html}, timestamp = {Tue, 12 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/alt/WangS019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CheuSUZZ19, author = {Albert Cheu and Adam D. Smith and Jonathan R. Ullman and David Zeber and Maxim Zhilyaev}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Distributed Differential Privacy via Shuffling}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {375--403}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_13}, doi = {10.1007/978-3-030-17653-2\_13}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CheuSUZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fat/CanettiCDRSS19, author = {Ran Canetti and Aloni Cohen and Nishanth Dikkala and Govind Ramnarayan and Sarah Scheffler and Adam D. Smith}, editor = {danah boyd and Jamie H. Morgenstern}, title = {From Soft Classifiers to Hard Decisions: How fair can we be?}, booktitle = {Proceedings of the Conference on Fairness, Accountability, and Transparency, FAT* 2019, Atlanta, GA, USA, January 29-31, 2019}, pages = {309--318}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3287560.3287561}, doi = {10.1145/3287560.3287561}, timestamp = {Fri, 26 Mar 2021 16:46:37 +0100}, biburl = {https://dblp.org/rec/conf/fat/CanettiCDRSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/CanonneKMSU19, author = {Cl{\'{e}}ment L. Canonne and Gautam Kamath and Audra McMillan and Adam D. Smith and Jonathan R. Ullman}, editor = {Moses Charikar and Edith Cohen}, title = {The structure of optimal private tests for simple hypotheses}, booktitle = {Proceedings of the 51st Annual {ACM} {SIGACT} Symposium on Theory of Computing, {STOC} 2019, Phoenix, AZ, USA, June 23-26, 2019}, pages = {310--321}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3313276.3316336}, doi = {10.1145/3313276.3316336}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/CanonneKMSU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-09231, author = {Ryan Rogers and Aaron Roth and Adam D. Smith and Nathan Srebro and Om Thakkar and Blake E. Woodworth}, title = {Guaranteed Validity for Empirical Approaches to Adaptive Data Analysis}, journal = {CoRR}, volume = {abs/1906.09231}, year = {2019}, url = {http://arxiv.org/abs/1906.09231}, eprinttype = {arXiv}, eprint = {1906.09231}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-09231.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-09630, author = {Albert Cheu and Adam D. Smith and Jonathan R. Ullman}, title = {Manipulation Attacks in Local Differential Privacy}, journal = {CoRR}, volume = {abs/1909.09630}, year = {2019}, url = {http://arxiv.org/abs/1909.09630}, eprinttype = {arXiv}, eprint = {1909.09630}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-09630.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheuSUZZ19, author = {Albert Cheu and Adam D. Smith and Jonathan R. Ullman and David Zeber and Maxim Zhilyaev}, title = {Distributed Differential Privacy via Shuffling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {245}, year = {2019}, url = {https://eprint.iacr.org/2019/245}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CheuSUZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BorgsCSZ18, author = {Christian Borgs and Jennifer T. Chayes and Adam D. Smith and Ilias Zadik}, editor = {Mikkel Thorup}, title = {Revealing Network Structure, Confidentially: Improved Rates for Node-Private Graphon Estimation}, booktitle = {59th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS} 2018, Paris, France, October 7-9, 2018}, pages = {533--543}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/FOCS.2018.00057}, doi = {10.1109/FOCS.2018.00057}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/BorgsCSZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/UllmanSNSS18, author = {Jonathan R. Ullman and Adam D. Smith and Kobbi Nissim and Uri Stemmer and Thomas Steinke}, editor = {Samy Bengio and Hanna M. Wallach and Hugo Larochelle and Kristen Grauman and Nicol{\`{o}} Cesa{-}Bianchi and Roman Garnett}, title = {The Limits of Post-Selection Generalization}, booktitle = {Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, December 3-8, 2018, Montr{\'{e}}al, Canada}, pages = {6402--6411}, year = {2018}, url = {https://proceedings.neurips.cc/paper/2018/hash/77ee3bc58ce560b86c2b59363281e914-Abstract.html}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/UllmanSNSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/WoodworthWSMS18, author = {Blake E. Woodworth and Jialei Wang and Adam D. Smith and Brendan McMahan and Nati Srebro}, editor = {Samy Bengio and Hanna M. Wallach and Hugo Larochelle and Kristen Grauman and Nicol{\`{o}} Cesa{-}Bianchi and Roman Garnett}, title = {Graph Oracle Models, Lower Bounds, and Gaps for Parallel Stochastic Optimization}, booktitle = {Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, December 3-8, 2018, Montr{\'{e}}al, Canada}, pages = {8505--8515}, year = {2018}, url = {https://proceedings.neurips.cc/paper/2018/hash/3ec27c2cff04bc5fd2586ca36c62044e-Abstract.html}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/WoodworthWSMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-06100, author = {Kobbi Nissim and Adam D. Smith and Thomas Steinke and Uri Stemmer and Jonathan R. Ullman}, title = {The Limits of Post-Selection Generalization}, journal = {CoRR}, volume = {abs/1806.06100}, year = {2018}, url = {http://arxiv.org/abs/1806.06100}, eprinttype = {arXiv}, eprint = {1806.06100}, timestamp = {Sun, 14 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-06100.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-01394, author = {Albert Cheu and Adam D. Smith and Jonathan R. Ullman and David Zeber and Maxim Zhilyaev}, title = {Distributed Differential Privacy via Mixnets}, journal = {CoRR}, volume = {abs/1808.01394}, year = {2018}, url = {http://arxiv.org/abs/1808.01394}, eprinttype = {arXiv}, eprint = {1808.01394}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-01394.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-02003, author = {Ran Canetti and Aloni Cohen and Nishanth Dikkala and Govind Ramnarayan and Sarah Scheffler and Adam D. Smith}, title = {From Soft Classifiers to Hard Decisions: How fair can we be?}, journal = {CoRR}, volume = {abs/1810.02003}, year = {2018}, url = {http://arxiv.org/abs/1810.02003}, eprinttype = {arXiv}, eprint = {1810.02003}, timestamp = {Tue, 30 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-02003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-02183, author = {Christian Borgs and Jennifer T. Chayes and Adam D. Smith and Ilias Zadik}, title = {Revealing Network Structure, Confidentially: Improved Rates for Node-Private Graphon Estimation}, journal = {CoRR}, volume = {abs/1810.02183}, year = {2018}, url = {http://arxiv.org/abs/1810.02183}, eprinttype = {arXiv}, eprint = {1810.02183}, timestamp = {Thu, 01 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-02183.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-12518, author = {Christian Borgs and Jennifer T. Chayes and Adam D. Smith and Ilias Zadik}, title = {Private Algorithms Can Always Be Extended}, journal = {CoRR}, volume = {abs/1810.12518}, year = {2018}, url = {http://arxiv.org/abs/1810.12518}, eprinttype = {arXiv}, eprint = {1810.12518}, timestamp = {Thu, 08 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-12518.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-11148, author = {Cl{\'{e}}ment L. Canonne and Gautam Kamath and Audra McMillan and Adam D. Smith and Jonathan R. Ullman}, title = {The Structure of Optimal Private Tests for Simple Hypotheses}, journal = {CoRR}, volume = {abs/1811.11148}, year = {2018}, url = {http://arxiv.org/abs/1811.11148}, eprinttype = {arXiv}, eprint = {1811.11148}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-11148.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-06825, author = {Di Wang and Adam D. Smith and Jinhui Xu}, title = {Differentially Private Empirical Risk Minimization in Non-interactive Local Model via Polynomial of Inner Product Approximation}, journal = {CoRR}, volume = {abs/1812.06825}, year = {2018}, url = {http://arxiv.org/abs/1812.06825}, eprinttype = {arXiv}, eprint = {1812.06825}, timestamp = {Tue, 12 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-06825.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReyzinSY18, author = {Leonid Reyzin and Adam D. Smith and Sophia Yakoubov}, title = {Turning {HATE} Into {LOVE:} Homomorphic Ad Hoc Threshold Encryption for Scalable {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {997}, year = {2018}, url = {https://eprint.iacr.org/2018/997}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReyzinSY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KiltzOS17, author = {Eike Kiltz and Adam O'Neill and Adam D. Smith}, title = {Instantiability of {RSA-OAEP} Under Chosen-Plaintext Attack}, journal = {J. Cryptol.}, volume = {30}, number = {3}, pages = {889--919}, year = {2017}, url = {https://doi.org/10.1007/s00145-016-9238-4}, doi = {10.1007/S00145-016-9238-4}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KiltzOS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SmithTU17, author = {Adam D. Smith and Abhradeep Thakurta and Jalaj Upadhyay}, title = {Is Interaction Necessary for Distributed Private Learning?}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {58--77}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.35}, doi = {10.1109/SP.2017.35}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/SmithTU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Smith17b, author = {Adam D. Smith}, title = {Information, Privacy and Stability in Adaptive Data Analysis}, journal = {CoRR}, volume = {abs/1706.00820}, year = {2017}, url = {http://arxiv.org/abs/1706.00820}, eprinttype = {arXiv}, eprint = {1706.00820}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Smith17b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/GuruswamiS16, author = {Venkatesan Guruswami and Adam D. Smith}, title = {Optimal Rate Code Constructions for Computationally Simple Channels}, journal = {J. {ACM}}, volume = {63}, number = {4}, pages = {35:1--35:37}, year = {2016}, url = {https://doi.org/10.1145/2936015}, doi = {10.1145/2936015}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/GuruswamiS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/DworkMNS16, author = {Cynthia Dwork and Frank McSherry and Kobbi Nissim and Adam D. Smith}, title = {Calibrating Noise to Sensitivity in Private Data Analysis}, journal = {J. Priv. Confidentiality}, volume = {7}, number = {3}, pages = {17--51}, year = {2016}, url = {https://doi.org/10.29012/jpc.v7i3.405}, doi = {10.29012/JPC.V7I3.405}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/DworkMNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FullerRS16, author = {Benjamin Fuller and Leonid Reyzin and Adam D. Smith}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {When Are Fuzzy Extractors Possible?}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {277--306}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_10}, doi = {10.1007/978-3-662-53887-6\_10}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/FullerRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CanettiFPRS16, author = {Ran Canetti and Benjamin Fuller and Omer Paneth and Leonid Reyzin and Adam D. Smith}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Reusable Fuzzy Extractors for Low-Entropy Distributions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {117--146}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_5}, doi = {10.1007/978-3-662-49890-3\_5}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CanettiFPRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/RogersRST16, author = {Ryan M. Rogers and Aaron Roth and Adam D. Smith and Om Thakkar}, editor = {Irit Dinur}, title = {Max-Information, Differential Privacy, and Post-selection Hypothesis Testing}, booktitle = {{IEEE} 57th Annual Symposium on Foundations of Computer Science, {FOCS} 2016, 9-11 October 2016, Hyatt Regency, New Brunswick, New Jersey, {USA}}, pages = {487--494}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/FOCS.2016.59}, doi = {10.1109/FOCS.2016.59}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/focs/RogersRST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/RaskhodnikovaS16, author = {Sofya Raskhodnikova and Adam D. Smith}, editor = {Irit Dinur}, title = {Lipschitz Extensions for Node-Private Graph Statistics and the Generalized Exponential Mechanism}, booktitle = {{IEEE} 57th Annual Symposium on Foundations of Computer Science, {FOCS} 2016, 9-11 October 2016, Hyatt Regency, New Brunswick, New Jersey, {USA}}, pages = {495--504}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/FOCS.2016.60}, doi = {10.1109/FOCS.2016.60}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/RaskhodnikovaS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BassilyNSSSU16, author = {Raef Bassily and Kobbi Nissim and Adam D. Smith and Thomas Steinke and Uri Stemmer and Jonathan R. Ullman}, editor = {Daniel Wichs and Yishay Mansour}, title = {Algorithmic stability for adaptive data analysis}, booktitle = {Proceedings of the 48th Annual {ACM} {SIGACT} Symposium on Theory of Computing, {STOC} 2016, Cambridge, MA, USA, June 18-21, 2016}, pages = {1046--1059}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897518.2897566}, doi = {10.1145/2897518.2897566}, timestamp = {Sun, 14 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/BassilyNSSSU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2016b1, editor = {Martin Hirt and Adam D. Smith}, title = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4}, doi = {10.1007/978-3-662-53641-4}, isbn = {978-3-662-53640-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2016b1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2016b2, editor = {Martin Hirt and Adam D. Smith}, title = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5}, doi = {10.1007/978-3-662-53644-5}, isbn = {978-3-662-53643-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2016b2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/algo/RaskhodnikovaS16, author = {Sofya Raskhodnikova and Adam D. Smith}, title = {Differentially Private Analysis of Graphs}, booktitle = {Encyclopedia of Algorithms}, pages = {543--547}, year = {2016}, url = {https://doi.org/10.1007/978-1-4939-2864-4\_549}, doi = {10.1007/978-1-4939-2864-4\_549}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/algo/RaskhodnikovaS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/McMillanS16, author = {Audra McMillan and Adam D. Smith}, title = {When is Nontrivial Estimation Possible for Graphons and Stochastic Block Models?}, journal = {CoRR}, volume = {abs/1604.01871}, year = {2016}, url = {http://arxiv.org/abs/1604.01871}, eprinttype = {arXiv}, eprint = {1604.01871}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/McMillanS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RogersRST16, author = {Ryan M. Rogers and Aaron Roth and Adam D. Smith and Om Thakkar}, title = {Max-Information, Differential Privacy, and Post-Selection Hypothesis Testing}, journal = {CoRR}, volume = {abs/1604.03924}, year = {2016}, url = {http://arxiv.org/abs/1604.03924}, eprinttype = {arXiv}, eprint = {1604.03924}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/RogersRST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GentryGIPSS15, author = {Craig Gentry and Jens Groth and Yuval Ishai and Chris Peikert and Amit Sahai and Adam D. Smith}, title = {Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs}, journal = {J. Cryptol.}, volume = {28}, number = {4}, pages = {820--843}, year = {2015}, url = {https://doi.org/10.1007/s00145-014-9184-y}, doi = {10.1007/S00145-014-9184-Y}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GentryGIPSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/DworkSSUV15, author = {Cynthia Dwork and Adam D. Smith and Thomas Steinke and Jonathan R. Ullman and Salil P. Vadhan}, editor = {Venkatesan Guruswami}, title = {Robust Traceability from Trace Amounts}, booktitle = {{IEEE} 56th Annual Symposium on Foundations of Computer Science, {FOCS} 2015, Berkeley, CA, USA, 17-20 October, 2015}, pages = {650--669}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/FOCS.2015.46}, doi = {10.1109/FOCS.2015.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/DworkSSUV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/BlumMSS15, author = {Avrim Blum and Jamie Morgenstern and Ankit Sharma and Adam D. Smith}, editor = {Tim Roughgarden}, title = {Privacy-Preserving Public Information for Sequential Games}, booktitle = {Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, {ITCS} 2015, Rehovot, Israel, January 11-13, 2015}, pages = {173--180}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2688073.2688100}, doi = {10.1145/2688073.2688100}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/BlumMSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/BorgsCS15, author = {Christian Borgs and Jennifer T. Chayes and Adam D. Smith}, editor = {Corinna Cortes and Neil D. Lawrence and Daniel D. Lee and Masashi Sugiyama and Roman Garnett}, title = {Private Graphon Estimation for Sparse Graphs}, booktitle = {Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, December 7-12, 2015, Montreal, Quebec, Canada}, pages = {1369--1377}, year = {2015}, url = {https://proceedings.neurips.cc/paper/2015/hash/7250eb93b3c18cc9daa29cf58af7a004-Abstract.html}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/BorgsCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BassilyS15, author = {Raef Bassily and Adam D. Smith}, editor = {Rocco A. Servedio and Ronitt Rubinfeld}, title = {Local, Private, Efficient Protocols for Succinct Histograms}, booktitle = {Proceedings of the Forty-Seventh Annual {ACM} on Symposium on Theory of Computing, {STOC} 2015, Portland, OR, USA, June 14-17, 2015}, pages = {127--135}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2746539.2746632}, doi = {10.1145/2746539.2746632}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/BassilyS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/SmithZ15, author = {Adam D. Smith and Ye Zhang}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {On the Regularity of Lossy {RSA} - Improved Bounds and Applications to Padding-Based Encryption}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {609--628}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_25}, doi = {10.1007/978-3-662-46494-6\_25}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/SmithZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BassilyS15, author = {Raef Bassily and Adam D. Smith}, title = {Local, Private, Efficient Protocols for Succinct Histograms}, journal = {CoRR}, volume = {abs/1504.04686}, year = {2015}, url = {http://arxiv.org/abs/1504.04686}, eprinttype = {arXiv}, eprint = {1504.04686}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BassilyS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RaskhodnikovaS15, author = {Sofya Raskhodnikova and Adam D. Smith}, title = {Efficient Lipschitz Extensions for High-Dimensional Graph Statistics and Node Private Degree Distributions}, journal = {CoRR}, volume = {abs/1504.07912}, year = {2015}, url = {http://arxiv.org/abs/1504.07912}, eprinttype = {arXiv}, eprint = {1504.07912}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RaskhodnikovaS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BorgsCS15, author = {Christian Borgs and Jennifer T. Chayes and Adam D. Smith}, title = {Private Graphon Estimation for Sparse Graphs}, journal = {CoRR}, volume = {abs/1506.06162}, year = {2015}, url = {http://arxiv.org/abs/1506.06162}, eprinttype = {arXiv}, eprint = {1506.06162}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BorgsCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HallgrenS015, author = {Sean Hallgren and Adam D. Smith and Fang Song}, title = {Classical Cryptographic Protocols in a Quantum World}, journal = {CoRR}, volume = {abs/1507.01625}, year = {2015}, url = {http://arxiv.org/abs/1507.01625}, eprinttype = {arXiv}, eprint = {1507.01625}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HallgrenS015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BassilyNSSSU15, author = {Raef Bassily and Kobbi Nissim and Adam D. Smith and Thomas Steinke and Uri Stemmer and Jonathan R. Ullman}, title = {Algorithmic Stability for Adaptive Data Analysis}, journal = {CoRR}, volume = {abs/1511.02513}, year = {2015}, url = {http://arxiv.org/abs/1511.02513}, eprinttype = {arXiv}, eprint = {1511.02513}, timestamp = {Sun, 14 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/BassilyNSSSU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SmithZ15, author = {Adam D. Smith and Ye Zhang}, title = {On the Regularity of Lossy {RSA:} Improved Bounds and Applications to Padding-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2015}, url = {http://eprint.iacr.org/2015/027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SmithZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HallgrenS015, author = {Sean Hallgren and Adam D. Smith and Fang Song}, title = {Classical Cryptographic Protocols in a Quantum World}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {687}, year = {2015}, url = {http://eprint.iacr.org/2015/687}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HallgrenS015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Kasiviswanathan14, author = {Shiva Prasad Kasiviswanathan and Adam D. Smith}, title = {On the 'Semantics' of Differential Privacy: {A} Bayesian Formulation}, journal = {J. Priv. Confidentiality}, volume = {6}, number = {1}, year = {2014}, url = {https://doi.org/10.29012/jpc.v6i1.634}, doi = {10.29012/JPC.V6I1.634}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Kasiviswanathan14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tods/KarwaRSY14, author = {Vishesh Karwa and Sofya Raskhodnikova and Adam D. Smith and Grigory Yaroslavtsev}, title = {Private Analysis of Graph Structure}, journal = {{ACM} Trans. Database Syst.}, volume = {39}, number = {3}, pages = {22:1--22:33}, year = {2014}, url = {https://doi.org/10.1145/2611523}, doi = {10.1145/2611523}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tods/KarwaRSY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BassilyST14, author = {Raef Bassily and Adam D. Smith and Abhradeep Thakurta}, title = {Private Empirical Risk Minimization: Efficient Algorithms and Tight Error Bounds}, booktitle = {55th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS} 2014, Philadelphia, PA, USA, October 18-21, 2014}, pages = {464--473}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/FOCS.2014.56}, doi = {10.1109/FOCS.2014.56}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/BassilyST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/BassilyS14, author = {Raef Bassily and Adam D. Smith}, editor = {Chandra Chekuri}, title = {Causal Erasure Channels}, booktitle = {Proceedings of the Twenty-Fifth Annual {ACM-SIAM} Symposium on Discrete Algorithms, {SODA} 2014, Portland, Oregon, USA, January 5-7, 2014}, pages = {1844--1857}, publisher = {{SIAM}}, year = {2014}, url = {https://doi.org/10.1137/1.9781611973402.133}, doi = {10.1137/1.9781611973402.133}, timestamp = {Tue, 02 Feb 2021 17:07:40 +0100}, biburl = {https://dblp.org/rec/conf/soda/BassilyS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BlumMSS14, author = {Avrim Blum and Jamie Morgenstern and Ankit Sharma and Adam D. Smith}, title = {Privacy-Preserving Public Information for Sequential Games}, journal = {CoRR}, volume = {abs/1402.4488}, year = {2014}, url = {http://arxiv.org/abs/1402.4488}, eprinttype = {arXiv}, eprint = {1402.4488}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BlumMSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BassilyST14, author = {Raef Bassily and Adam D. Smith and Abhradeep Thakurta}, title = {Private Empirical Risk Minimization, Revisited}, journal = {CoRR}, volume = {abs/1405.7085}, year = {2014}, url = {http://arxiv.org/abs/1405.7085}, eprinttype = {arXiv}, eprint = {1405.7085}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BassilyST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BassilyS14, author = {Raef Bassily and Adam D. Smith}, title = {Causal Erasure Channels}, journal = {CoRR}, volume = {abs/1409.3893}, year = {2014}, url = {http://arxiv.org/abs/1409.3893}, eprinttype = {arXiv}, eprint = {1409.3893}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BassilyS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FullerSR14, author = {Benjamin Fuller and Adam D. Smith and Leonid Reyzin}, title = {Where are Fuzzy Extractors Possible?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {961}, year = {2014}, url = {http://eprint.iacr.org/2014/961}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FullerSR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/RaskhodnikovaRRS13, author = {Sofya Raskhodnikova and Dana Ron and Ronitt Rubinfeld and Adam D. Smith}, title = {Sublinear Algorithms for Approximating String Compressibility}, journal = {Algorithmica}, volume = {65}, number = {3}, pages = {685--709}, year = {2013}, url = {https://doi.org/10.1007/s00453-012-9618-6}, doi = {10.1007/S00453-012-9618-6}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/algorithmica/RaskhodnikovaRRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colt/ThakurtaS13, author = {Abhradeep Thakurta and Adam D. Smith}, editor = {Shai Shalev{-}Shwartz and Ingo Steinwart}, title = {Differentially Private Feature Selection via Stability Arguments, and the Robustness of the Lasso}, booktitle = {{COLT} 2013 - The 26th Annual Conference on Learning Theory, June 12-14, 2013, Princeton University, NJ, {USA}}, series = {{JMLR} Workshop and Conference Proceedings}, volume = {30}, pages = {819--850}, publisher = {JMLR.org}, year = {2013}, url = {http://proceedings.mlr.press/v30/Guha13.html}, timestamp = {Wed, 29 May 2019 08:41:46 +0200}, biburl = {https://dblp.org/rec/conf/colt/ThakurtaS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LewkoOS13, author = {Mark Lewko and Adam O'Neill and Adam D. Smith}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Regularity of Lossy {RSA} on Subdomains and Its Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {55--75}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_4}, doi = {10.1007/978-3-642-38348-9\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LewkoOS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BassilyGKS13, author = {Raef Bassily and Adam Groce and Jonathan Katz and Adam D. Smith}, title = {Coupled-Worlds Privacy: Exploiting Adversarial Uncertainty in Statistical Data Privacy}, booktitle = {54th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2013, 26-29 October, 2013, Berkeley, CA, {USA}}, pages = {439--448}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/FOCS.2013.54}, doi = {10.1109/FOCS.2013.54}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/BassilyGKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/ThakurtaS13, author = {Abhradeep Guha Thakurta and Adam D. Smith}, editor = {Christopher J. C. Burges and L{\'{e}}on Bottou and Zoubin Ghahramani and Kilian Q. Weinberger}, title = {(Nearly) Optimal Algorithms for Private Online Learning in Full-information and Bandit Settings}, booktitle = {Advances in Neural Information Processing Systems 26: 27th Annual Conference on Neural Information Processing Systems 2013. Proceedings of a meeting held December 5-8, 2013, Lake Tahoe, Nevada, United States}, pages = {2733--2741}, year = {2013}, url = {https://proceedings.neurips.cc/paper/2013/hash/c850371fda6892fbfd1c5a5b457e5777-Abstract.html}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/ThakurtaS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/KasiviswanathanRS13, author = {Shiva Prasad Kasiviswanathan and Mark Rudelson and Adam D. Smith}, editor = {Sanjeev Khanna}, title = {The Power of Linear Reconstruction Attacks}, booktitle = {Proceedings of the Twenty-Fourth Annual {ACM-SIAM} Symposium on Discrete Algorithms, {SODA} 2013, New Orleans, Louisiana, USA, January 6-8, 2013}, pages = {1415--1433}, publisher = {{SIAM}}, year = {2013}, url = {https://doi.org/10.1137/1.9781611973105.102}, doi = {10.1137/1.9781611973105.102}, timestamp = {Tue, 02 Feb 2021 17:07:29 +0100}, biburl = {https://dblp.org/rec/conf/soda/KasiviswanathanRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KasiviswanathanNRS13, author = {Shiva Prasad Kasiviswanathan and Kobbi Nissim and Sofya Raskhodnikova and Adam D. Smith}, editor = {Amit Sahai}, title = {Analyzing Graphs with Node Differential Privacy}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {457--476}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_26}, doi = {10.1007/978-3-642-36594-2\_26}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/KasiviswanathanNRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SmithZ13, author = {Adam D. Smith and Ye Zhang}, title = {Near-linear time, Leakage-resilient Key Evolution Schemes from Expander Graphs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {864}, year = {2013}, url = {http://eprint.iacr.org/2013/864}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SmithZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/SlavkovicS12, author = {Aleksandra B. Slavkovic and Adam D. Smith}, title = {Special Issue on Statistical and Learning-Theoretic Challenges in Data Privacy}, journal = {J. Priv. Confidentiality}, volume = {4}, number = {1}, year = {2012}, url = {https://doi.org/10.29012/jpc.v4i1.609}, doi = {10.29012/JPC.V4I1.609}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/SlavkovicS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/DodisKKRS12, author = {Yevgeniy Dodis and Bhavana Kanukurthi and Jonathan Katz and Leonid Reyzin and Adam D. Smith}, title = {Robust Fuzzy Extractors and Authenticated Key Agreement From Close Secrets}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {9}, pages = {6207--6222}, year = {2012}, url = {https://doi.org/10.1109/TIT.2012.2200290}, doi = {10.1109/TIT.2012.2200290}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/DodisKKRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/jmlr/KiferST12, author = {Daniel Kifer and Adam D. Smith and Abhradeep Thakurta}, editor = {Shie Mannor and Nathan Srebro and Robert C. Williamson}, title = {Private Convex Optimization for Empirical Risk Minimization with Applications to High-dimensional Regression}, booktitle = {{COLT} 2012 - The 25th Annual Conference on Learning Theory, June 25-27, 2012, Edinburgh, Scotland}, series = {{JMLR} Proceedings}, volume = {23}, pages = {25.1--25.40}, publisher = {JMLR.org}, year = {2012}, url = {http://proceedings.mlr.press/v23/kifer12/kifer12.pdf}, timestamp = {Wed, 29 May 2019 08:41:46 +0200}, biburl = {https://dblp.org/rec/journals/jmlr/KiferST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icits/2012, editor = {Adam D. Smith}, title = {Information Theoretic Security - 6th International Conference, {ICITS} 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7412}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32284-6}, doi = {10.1007/978-3-642-32284-6}, isbn = {978-3-642-32283-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1210-2381, author = {Shiva Prasad Kasiviswanathan and Mark Rudelson and Adam D. Smith}, title = {The Power of Linear Reconstruction Attacks}, journal = {CoRR}, volume = {abs/1210.2381}, year = {2012}, url = {http://arxiv.org/abs/1210.2381}, eprinttype = {arXiv}, eprint = {1210.2381}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1210-2381.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/KarwaRSY11, author = {Vishesh Karwa and Sofya Raskhodnikova and Adam D. Smith and Grigory Yaroslavtsev}, title = {Private Analysis of Graph Structure}, journal = {Proc. {VLDB} Endow.}, volume = {4}, number = {11}, pages = {1146--1157}, year = {2011}, url = {http://www.vldb.org/pvldb/vol4/p1146-karwa.pdf}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/KarwaRSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/KasiviswanathanLNRS11, author = {Shiva Prasad Kasiviswanathan and Homin K. Lee and Kobbi Nissim and Sofya Raskhodnikova and Adam D. Smith}, title = {What Can We Learn Privately?}, journal = {{SIAM} J. Comput.}, volume = {40}, number = {3}, pages = {793--826}, year = {2011}, url = {https://doi.org/10.1137/090756090}, doi = {10.1137/090756090}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/KasiviswanathanLNRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/TomamichelSSR11, author = {Marco Tomamichel and Christian Schaffner and Adam D. Smith and Renato Renner}, title = {Leftover Hashing Against Quantum Side Information}, journal = {{IEEE} Trans. Inf. Theory}, volume = {57}, number = {8}, pages = {5524--5535}, year = {2011}, url = {https://doi.org/10.1109/TIT.2011.2158473}, doi = {10.1109/TIT.2011.2158473}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/TomamichelSSR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HallgrenSS11, author = {Sean Hallgren and Adam D. Smith and Fang Song}, editor = {Phillip Rogaway}, title = {Classical Cryptographic Protocols in a Quantum World}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {411--428}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_23}, doi = {10.1007/978-3-642-22792-9\_23}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HallgrenSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/Smith11, author = {Adam D. Smith}, editor = {Lance Fortnow and Salil P. Vadhan}, title = {Privacy-preserving statistical estimation with optimal convergence rates}, booktitle = {Proceedings of the 43rd {ACM} Symposium on Theory of Computing, {STOC} 2011, San Jose, CA, USA, 6-8 June 2011}, pages = {813--822}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1993636.1993743}, doi = {10.1145/1993636.1993743}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/Smith11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiltzOS11, author = {Eike Kiltz and Adam O'Neill and Adam D. Smith}, title = {Instantiability of {RSA-OAEP} under Chosen-Plaintext Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {559}, year = {2011}, url = {http://eprint.iacr.org/2011/559}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiltzOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KatzSS10, author = {Jonathan Katz and Ji Sun Shin and Adam D. Smith}, title = {Parallel and Concurrent Security of the {HB} and HB\({}^{\mbox{+}}\) Protocols}, journal = {J. Cryptol.}, volume = {23}, number = {3}, pages = {402--421}, year = {2010}, url = {https://doi.org/10.1007/s00145-010-9061-2}, doi = {10.1007/S00145-010-9061-2}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KatzSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/DworkS10, author = {Cynthia Dwork and Adam D. Smith}, title = {Differential Privacy for Statistics: What we Know and What we Want to Learn}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {2}, year = {2010}, url = {https://doi.org/10.29012/jpc.v1i2.570}, doi = {10.29012/JPC.V1I2.570}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/DworkS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KiltzOS10, author = {Eike Kiltz and Adam O'Neill and Adam D. Smith}, editor = {Tal Rabin}, title = {Instantiability of {RSA-OAEP} under Chosen-Plaintext Attack}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {295--313}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_16}, doi = {10.1007/978-3-642-14623-7\_16}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KiltzOS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GuruswamiS10, author = {Venkatesan Guruswami and Adam D. Smith}, title = {Codes for Computationally Simple Channels: Explicit Constructions with Optimal Rate}, booktitle = {51th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2010, October 23-26, 2010, Las Vegas, Nevada, {USA}}, pages = {723--732}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/FOCS.2010.74}, doi = {10.1109/FOCS.2010.74}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GuruswamiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/TomamichelRSS10, author = {Marco Tomamichel and Renato Renner and Christian Schaffner and Adam D. Smith}, title = {Leftover Hashing against quantum side information}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2010, June 13-18, 2010, Austin, Texas, USA, Proceedings}, pages = {2703--2707}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ISIT.2010.5513652}, doi = {10.1109/ISIT.2010.5513652}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/TomamichelRSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/BhaskarLST10, author = {Raghav Bhaskar and Srivatsan Laxman and Adam D. Smith and Abhradeep Thakurta}, editor = {Bharat Rao and Balaji Krishnapuram and Andrew Tomkins and Qiang Yang}, title = {Discovering frequent patterns in sensitive data}, booktitle = {Proceedings of the 16th {ACM} {SIGKDD} International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, July 25-28, 2010}, pages = {503--512}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1835804.1835869}, doi = {10.1145/1835804.1835869}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kdd/BhaskarLST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/KasiviswanathanRSU10, author = {Shiva Prasad Kasiviswanathan and Mark Rudelson and Adam D. Smith and Jonathan R. Ullman}, editor = {Leonard J. Schulman}, title = {The price of privately releasing contingency tables and the spectra of random matrices with correlated rows}, booktitle = {Proceedings of the 42nd {ACM} Symposium on Theory of Computing, {STOC} 2010, Cambridge, Massachusetts, USA, 5-8 June 2010}, pages = {775--784}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1806689.1806795}, doi = {10.1145/1806689.1806795}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/KasiviswanathanRSU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1004-4017, author = {Venkatesan Guruswami and Adam D. Smith}, title = {Codes for Computationally Simple Channels: Explicit Constructions with Optimal Rate}, journal = {CoRR}, volume = {abs/1004.4017}, year = {2010}, url = {http://arxiv.org/abs/1004.4017}, eprinttype = {arXiv}, eprint = {1004.4017}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1004-4017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/GuruswamiS10, author = {Venkatesan Guruswami and Adam D. Smith}, title = {Codes for Computationally Simple Channels: Explicit Constructions with Optimal Rate}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR10-077}}, year = {2010}, url = {https://eccc.weizmann.ac.il/report/2010/077}, eprinttype = {ECCC}, eprint = {TR10-077}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/GuruswamiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisKKRS10, author = {Yevgeniy Dodis and Bhavana Kanukurthi and Jonathan Katz and Leonid Reyzin and Adam D. Smith}, title = {Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {456}, year = {2010}, url = {http://eprint.iacr.org/2010/456}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisKKRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/RaskhodnikovaRSS09, author = {Sofya Raskhodnikova and Dana Ron and Amir Shpilka and Adam D. Smith}, title = {Strong Lower Bounds for Approximating Distribution Support Size and the Distinct Elements Problem}, journal = {{SIAM} J. Comput.}, volume = {39}, number = {3}, pages = {813--842}, year = {2009}, url = {https://doi.org/10.1137/070701649}, doi = {10.1137/070701649}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/RaskhodnikovaRSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/Smith09, author = {Adam D. Smith}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Asymptotically Optimal and Private Statistical Estimation}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {53--57}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_4}, doi = {10.1007/978-3-642-10433-6\_4}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/Smith09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Smith09, author = {Adam D. Smith}, editor = {Kaoru Kurosawa}, title = {What Can Cryptography Do for Coding Theory?}, booktitle = {Information Theoretic Security, 4th International Conference, {ICITS} 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5973}, pages = {158}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14496-7\_13}, doi = {10.1007/978-3-642-14496-7\_13}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/Smith09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisKSW09, author = {Yevgeniy Dodis and Jonathan Katz and Adam D. Smith and Shabsi Walfish}, editor = {Omer Reingold}, title = {Composability and On-Line Deniability of Authentication}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {146--162}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_10}, doi = {10.1007/978-3-642-00457-5\_10}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DodisKSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/DodisORS08, author = {Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam D. Smith}, title = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data}, journal = {{SIAM} J. Comput.}, volume = {38}, number = {1}, pages = {97--139}, year = {2008}, url = {https://doi.org/10.1137/060651380}, doi = {10.1137/060651380}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/DodisORS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/NaorSS08, author = {Moni Naor and Gil Segev and Adam D. Smith}, title = {Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models}, journal = {{IEEE} Trans. Inf. Theory}, volume = {54}, number = {6}, pages = {2408--2425}, year = {2008}, url = {https://doi.org/10.1109/TIT.2008.921691}, doi = {10.1109/TIT.2008.921691}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/NaorSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/EnckBRMS08, author = {William Enck and Kevin R. B. Butler and Thomas Richardson and Patrick D. McDaniel and Adam D. Smith}, title = {Defending Against Attacks on Main Memory Persistence}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {65--74}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.45}, doi = {10.1109/ACSAC.2008.45}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/EnckBRMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DamgardIKNS08, author = {Ivan Damg{\aa}rd and Yuval Ishai and Mikkel Kr{\o}igaard and Jesper Buus Nielsen and Adam D. Smith}, editor = {David A. Wagner}, title = {Scalable Multiparty Computation with Nearly Optimal Work and Resilience}, booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5157}, pages = {241--261}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85174-5\_14}, doi = {10.1007/978-3-540-85174-5\_14}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DamgardIKNS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GoyalMS08, author = {Vipul Goyal and Payman Mohassel and Adam D. Smith}, editor = {Nigel P. Smart}, title = {Efficient Two Party and Multi Party Computation Against Covert Adversaries}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {289--306}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_17}, doi = {10.1007/978-3-540-78967-3\_17}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GoyalMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/KasiviswanathanLNRS08, author = {Shiva Prasad Kasiviswanathan and Homin K. Lee and Kobbi Nissim and Sofya Raskhodnikova and Adam D. Smith}, title = {What Can We Learn Privately?}, booktitle = {49th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2008, October 25-28, 2008, Philadelphia, PA, {USA}}, pages = {531--540}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/FOCS.2008.27}, doi = {10.1109/FOCS.2008.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/KasiviswanathanLNRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/GantaKS08, author = {Srivatsava Ranjit Ganta and Shiva Prasad Kasiviswanathan and Adam D. Smith}, editor = {Ying Li and Bing Liu and Sunita Sarawagi}, title = {Composition attacks and auxiliary information in data privacy}, booktitle = {Proceedings of the 14th {ACM} {SIGKDD} International Conference on Knowledge Discovery and Data Mining, Las Vegas, Nevada, USA, August 24-27, 2008}, pages = {265--273}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1401890.1401926}, doi = {10.1145/1401890.1401926}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kdd/GantaKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0803-0032, author = {Srivatsava Ranjit Ganta and Shiva Prasad Kasiviswanathan and Adam D. Smith}, title = {Composition Attacks and Auxiliary Information in Data Privacy}, journal = {CoRR}, volume = {abs/0803.0032}, year = {2008}, url = {http://arxiv.org/abs/0803.0032}, eprinttype = {arXiv}, eprint = {0803.0032}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0803-0032.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0803-0924, author = {Shiva Prasad Kasiviswanathan and Homin K. Lee and Kobbi Nissim and Sofya Raskhodnikova and Adam D. Smith}, title = {What Can We Learn Privately?}, journal = {CoRR}, volume = {abs/0803.0924}, year = {2008}, url = {http://arxiv.org/abs/0803.0924}, eprinttype = {arXiv}, eprint = {0803.0924}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0803-0924.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0803-3946, author = {Shiva Prasad Kasiviswanathan and Adam D. Smith}, title = {A Note on Differential Privacy: Defining Resistance to Arbitrary Side Information}, journal = {CoRR}, volume = {abs/0803.3946}, year = {2008}, url = {http://arxiv.org/abs/0803.3946}, eprinttype = {arXiv}, eprint = {0803.3946}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0803-3946.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0809-4794, author = {Adam D. Smith}, title = {Efficient, Differentially Private Point Estimators}, journal = {CoRR}, volume = {abs/0809.4794}, year = {2008}, url = {http://arxiv.org/abs/0809.4794}, eprinttype = {arXiv}, eprint = {0809.4794}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0809-4794.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/approx/RaskhodnikovaRRS07, author = {Sofya Raskhodnikova and Dana Ron and Ronitt Rubinfeld and Adam D. Smith}, editor = {Moses Charikar and Klaus Jansen and Omer Reingold and Jos{\'{e}} D. P. Rolim}, title = {Sublinear Algorithms for Approximating String Compressibility}, booktitle = {Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, 10th International Workshop, {APPROX} 2007, and 11th International Workshop, {RANDOM} 2007, Princeton, NJ, USA, August 20-22, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4627}, pages = {609--623}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74208-1\_44}, doi = {10.1007/978-3-540-74208-1\_44}, timestamp = {Sat, 30 Sep 2023 09:34:32 +0200}, biburl = {https://dblp.org/rec/conf/approx/RaskhodnikovaRRS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/RaskhodnikovaRSS07, author = {Sofya Raskhodnikova and Dana Ron and Amir Shpilka and Adam D. Smith}, title = {Strong Lower Bounds for Approximating Distribution Support Size and the Distinct Elements Problem}, booktitle = {48th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS} 2007), October 20-23, 2007, Providence, RI, USA, Proceedings}, pages = {559--569}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/FOCS.2007.67}, doi = {10.1109/FOCS.2007.67}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/RaskhodnikovaRSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/Smith07, author = {Adam D. Smith}, editor = {Nikhil Bansal and Kirk Pruhs and Clifford Stein}, title = {Scrambling adversarial errors using few random bits, optimal information reconciliation, and better private codes}, booktitle = {Proceedings of the Eighteenth Annual {ACM-SIAM} Symposium on Discrete Algorithms, {SODA} 2007, New Orleans, Louisiana, USA, January 7-9, 2007}, pages = {395--404}, publisher = {{SIAM}}, year = {2007}, url = {http://dl.acm.org/citation.cfm?id=1283383.1283425}, timestamp = {Tue, 15 Feb 2022 07:54:27 +0100}, biburl = {https://dblp.org/rec/conf/soda/Smith07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/NissimRS07, author = {Kobbi Nissim and Sofya Raskhodnikova and Adam D. Smith}, editor = {David S. Johnson and Uriel Feige}, title = {Smooth sensitivity and sampling in private data analysis}, booktitle = {Proceedings of the 39th Annual {ACM} Symposium on Theory of Computing, San Diego, California, USA, June 11-13, 2007}, pages = {75--84}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1250790.1250803}, doi = {10.1145/1250790.1250803}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/NissimRS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0706-1084, author = {Sofya Raskhodnikova and Dana Ron and Ronitt Rubinfeld and Adam D. Smith}, title = {Sublinear Algorithms for Approximating String Compressibility}, journal = {CoRR}, volume = {abs/0706.1084}, year = {2007}, url = {http://arxiv.org/abs/0706.1084}, eprinttype = {arXiv}, eprint = {0706.1084}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0706-1084.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/NaorSS06, author = {Moni Naor and Gil Segev and Adam D. Smith}, editor = {Cynthia Dwork}, title = {Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {214--231}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_13}, doi = {10.1007/11818175\_13}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/NaorSS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisKRS06, author = {Yevgeniy Dodis and Jonathan Katz and Leonid Reyzin and Adam D. Smith}, editor = {Cynthia Dwork}, title = {Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {232--250}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_14}, doi = {10.1007/11818175\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisKRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/Ben-OrCGHS06, author = {Michael Ben{-}Or and Claude Cr{\'{e}}peau and Daniel Gottesman and Avinatan Hassidim and Adam D. Smith}, title = {Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority}, booktitle = {47th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS} 2006), 21-24 October 2006, Berkeley, California, USA, Proceedings}, pages = {249--260}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/FOCS.2006.68}, doi = {10.1109/FOCS.2006.68}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/Ben-OrCGHS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DworkMNS06, author = {Cynthia Dwork and Frank McSherry and Kobbi Nissim and Adam D. Smith}, editor = {Shai Halevi and Tal Rabin}, title = {Calibrating Noise to Sensitivity in Private Data Analysis}, booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC} 2006, New York, NY, USA, March 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3876}, pages = {265--284}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11681878\_14}, doi = {10.1007/11681878\_14}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DworkMNS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0602007, author = {Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam D. Smith}, title = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data}, journal = {CoRR}, volume = {abs/cs/0602007}, year = {2006}, url = {http://arxiv.org/abs/cs/0602007}, eprinttype = {arXiv}, eprint = {cs/0602007}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0602007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/RaskhodnikovaS06, author = {Sofya Raskhodnikova and Adam D. Smith}, title = {A Note on Adaptivity in Testing Properties of Bounded Degree Graphs}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR06-089}}, year = {2006}, url = {https://eccc.weizmann.ac.il/eccc-reports/2006/TR06-089/index.html}, eprinttype = {ECCC}, eprint = {TR06-089}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/RaskhodnikovaS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Smith06, author = {Adam D. Smith}, title = {Scrambling Adversarial Errors Using Few Random Bits, Optimal Information Reconciliation, and Better Private Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {20}, year = {2006}, url = {http://eprint.iacr.org/2006/020}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Smith06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorSS06, author = {Moni Naor and Gil Segev and Adam D. Smith}, title = {Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2006}, url = {http://eprint.iacr.org/2006/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorSS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzS06, author = {Jonathan Katz and Adam D. Smith}, title = {Analyzing the {HB} and {HB+} Protocols in the "Large Error" Case}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {326}, year = {2006}, url = {http://eprint.iacr.org/2006/326}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoyenDKOS05, author = {Xavier Boyen and Yevgeniy Dodis and Jonathan Katz and Rafail Ostrovsky and Adam D. Smith}, editor = {Ronald Cramer}, title = {Secure Remote Authentication Using Biometric Data}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {147--163}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_9}, doi = {10.1007/11426639\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoyenDKOS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CrepeauGS05, author = {Claude Cr{\'{e}}peau and Daniel Gottesman and Adam D. Smith}, editor = {Ronald Cramer}, title = {Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {285--301}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_17}, doi = {10.1007/11426639\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CrepeauGS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/DodisS05, author = {Yevgeniy Dodis and Adam D. Smith}, editor = {Harold N. Gabow and Ronald Fagin}, title = {Correcting errors without leaking partial information}, booktitle = {Proceedings of the 37th Annual {ACM} Symposium on Theory of Computing, Baltimore, MD, USA, May 22-24, 2005}, pages = {654--663}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1060590.1060688}, doi = {10.1145/1060590.1060688}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/DodisS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ChawlaDMSW05, author = {Shuchi Chawla and Cynthia Dwork and Frank McSherry and Adam D. Smith and Hoeteck Wee}, editor = {Joe Kilian}, title = {Toward Privacy in Public Databases}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {363--385}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_20}, doi = {10.1007/978-3-540-30576-7\_20}, timestamp = {Sun, 02 Jun 2019 21:21:22 +0200}, biburl = {https://dblp.org/rec/conf/tcc/ChawlaDMSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisS05, author = {Yevgeniy Dodis and Adam D. Smith}, editor = {Joe Kilian}, title = {Entropic Security and the Encryption of High Entropy Messages}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {556--577}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_30}, doi = {10.1007/978-3-540-30576-7\_30}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DodisS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-quant-ph-0503139, author = {Claude Cr{\'{e}}peau and Daniel Gottesman and Adam D. Smith}, title = {Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes}, journal = {CoRR}, volume = {abs/quant-ph/0503139}, year = {2005}, url = {http://arxiv.org/abs/quant-ph/0503139}, eprinttype = {arXiv}, eprint = {quant-ph/0503139}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-quant-ph-0503139.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR05-125, author = {Sofya Raskhodnikova and Dana Ron and Ronitt Rubinfeld and Amir Shpilka and Adam D. Smith}, title = {Sublinear Algorithms for Approximating String Compressibility and the Distribution Support Size}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR05-125}}, year = {2005}, url = {https://eccc.weizmann.ac.il/eccc-reports/2005/TR05-125/index.html}, eprinttype = {ECCC}, eprint = {TR05-125}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR05-125.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ndltd/Smith04, author = {Adam D. Smith}, title = {Maintaining secrecy when information leakage is unavoidable}, school = {Massachusetts Institute of Technology, Cambridge, MA, {USA}}, year = {2004}, url = {https://hdl.handle.net/1721.1/28744}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ndltd/Smith04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/approx/AmbainisS04, author = {Andris Ambainis and Adam D. Smith}, editor = {Klaus Jansen and Sanjeev Khanna and Jos{\'{e}} D. P. Rolim and Dana Ron}, title = {Small Pseudo-random Families of Matrices: Derandomizing Approximate Quantum Encryption}, booktitle = {Approximation, Randomization, and Combinatorial Optimization, Algorithms and Techniques, 7th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, {APPROX} 2004, and 8th International Workshop on Randomization and Computation, {RANDOM} 2004, Cambridge, MA, USA, August 22-24, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3122}, pages = {249--260}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27821-4\_23}, doi = {10.1007/978-3-540-27821-4\_23}, timestamp = {Tue, 21 Sep 2021 09:36:24 +0200}, biburl = {https://dblp.org/rec/conf/approx/AmbainisS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisRS04, author = {Yevgeniy Dodis and Leonid Reyzin and Adam D. Smith}, editor = {Christian Cachin and Jan Camenisch}, title = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {523--540}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_31}, doi = {10.1007/978-3-540-24676-3\_31}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisRS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/OstrovskyRS04, author = {Rafail Ostrovsky and Charles Rackoff and Adam D. Smith}, editor = {Josep D{\'{\i}}az and Juhani Karhum{\"{a}}ki and Arto Lepist{\"{o}} and Donald Sannella}, title = {Efficient Consistency Proofs for Generalized Queries on a Committed Database}, booktitle = {Automata, Languages and Programming: 31st International Colloquium, {ICALP} 2004, Turku, Finland, July 12-16, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3142}, pages = {1041--1053}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27836-8\_87}, doi = {10.1007/978-3-540-27836-8\_87}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/OstrovskyRS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DworkSST04, author = {Cynthia Dwork and Ronen Shaltiel and Adam D. Smith and Luca Trevisan}, editor = {Moni Naor}, title = {List-Decoding of Linear Functions and Analysis of a Two-Round Zero-Knowledge Argument}, booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC} 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2951}, pages = {101--120}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24638-1\_6}, doi = {10.1007/978-3-540-24638-1\_6}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DworkSST04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OstrovskyRS04, author = {Rafail Ostrovsky and Charles Rackoff and Adam D. Smith}, title = {Efficient Consistency Proofs for Generalized Queries on a Committed Database}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {170}, year = {2004}, url = {http://eprint.iacr.org/2004/170}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OstrovskyRS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisS04, author = {Yevgeniy Dodis and Adam D. Smith}, title = {Entropic Security and the Encryption of High Entropy Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {219}, year = {2004}, url = {http://eprint.iacr.org/2004/219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KatzOS03, author = {Jonathan Katz and Rafail Ostrovsky and Adam D. Smith}, editor = {Eli Biham}, title = {Round Efficiency of Multi-party Computation with a Dishonest Majority}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2656}, pages = {578--595}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-39200-9\_36}, doi = {10.1007/3-540-39200-9\_36}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KatzOS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/PeikertSS03, author = {Chris Peikert and Abhi Shelat and Adam D. Smith}, title = {Lower bounds for collusion-secure fingerprinting}, booktitle = {Proceedings of the Fourteenth Annual {ACM-SIAM} Symposium on Discrete Algorithms, January 12-14, 2003, Baltimore, Maryland, {USA}}, pages = {472--479}, publisher = {{ACM/SIAM}}, year = {2003}, url = {http://dl.acm.org/citation.cfm?id=644108.644187}, timestamp = {Fri, 08 Apr 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soda/PeikertSS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisORS03, author = {Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam D. Smith}, title = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {235}, year = {2003}, url = {http://eprint.iacr.org/2003/235}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisORS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coco/AmbainisSY02, author = {Andris Ambainis and Adam D. Smith and Ke Yang}, title = {Extracting Quantum Entanglement}, booktitle = {Proceedings of the 17th Annual {IEEE} Conference on Computational Complexity, Montr{\'{e}}al, Qu{\'{e}}bec, Canada, May 21-24, 2002}, pages = {103--112}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CCC.2002.1004345}, doi = {10.1109/CCC.2002.1004345}, timestamp = {Fri, 05 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coco/AmbainisSY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BarnumCGST02, author = {Howard Barnum and Claude Cr{\'{e}}peau and Daniel Gottesman and Adam D. Smith and Alain Tapp}, title = {Authentication of Quantum Messages}, booktitle = {43rd Symposium on Foundations of Computer Science {(FOCS} 2002), 16-19 November 2002, Vancouver, BC, Canada, Proceedings}, pages = {449--458}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/SFCS.2002.1181969}, doi = {10.1109/SFCS.2002.1181969}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/BarnumCGST02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/FitziGHHS02, author = {Matthias Fitzi and Daniel Gottesman and Martin Hirt and Thomas Holenstein and Adam D. Smith}, editor = {Aleta Ricciardi}, title = {Detectable byzantine agreement secure against faulty majorities}, booktitle = {Proceedings of the Twenty-First Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2002, Monterey, California, USA, July 21-24, 2002}, pages = {118--126}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/571825.571841}, doi = {10.1145/571825.571841}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/FitziGHHS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/CrepeauGS02, author = {Claude Cr{\'{e}}peau and Daniel Gottesman and Adam D. Smith}, editor = {John H. Reif}, title = {Secure multi-party quantum computation}, booktitle = {Proceedings on 34th Annual {ACM} Symposium on Theory of Computing, May 19-21, 2002, Montr{\'{e}}al, Qu{\'{e}}bec, Canada}, pages = {643--652}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/509907.510000}, doi = {10.1145/509907.510000}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/CrepeauGS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/quant-ph-0205128, author = {Howard Barnum and Claude Cr{\'{e}}peau and Daniel Gottesman and Adam D. Smith and Alain Tapp}, title = {Authentication of Quantum Messages}, journal = {CoRR}, volume = {quant-ph/0205128}, year = {2002}, url = {http://arxiv.org/abs/quant-ph/0205128}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/quant-ph-0205128.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarnumCGST02, author = {Howard Barnum and Claude Cr{\'{e}}peau and Daniel Gottesman and Adam D. Smith and Alain Tapp}, title = {Authentication of Quantum Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {82}, year = {2002}, url = {http://eprint.iacr.org/2002/082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarnumCGST02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LiskovLMRS01, author = {Moses D. Liskov and Anna Lysyanskaya and Silvio Micali and Leonid Reyzin and Adam D. Smith}, editor = {Colin Boyd}, title = {Mutually Independent Commitments}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2248}, pages = {385--401}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45682-1\_23}, doi = {10.1007/3-540-45682-1\_23}, timestamp = {Tue, 01 Jun 2021 15:22:33 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/LiskovLMRS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CrescenzoKOS01, author = {Giovanni Di Crescenzo and Jonathan Katz and Rafail Ostrovsky and Adam D. Smith}, editor = {Birgit Pfitzmann}, title = {Efficient and Non-interactive Non-malleable Commitment}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {40--59}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_4}, doi = {10.1007/3-540-44987-6\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CrescenzoKOS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisSS01, author = {Yevgeniy Dodis and Amit Sahai and Adam D. Smith}, editor = {Birgit Pfitzmann}, title = {On Perfect and Adaptive Security in Exposure-Resilient Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {301--324}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_19}, doi = {10.1007/3-540-44987-6\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisSS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CrescenzoKOS01, author = {Giovanni Di Crescenzo and Jonathan Katz and Rafail Ostrovsky and Adam D. Smith}, title = {Efficient and Non-Interactive Non-Malleable Commitment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {32}, year = {2001}, url = {http://eprint.iacr.org/2001/032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CrescenzoKOS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CR-9902010, author = {Adam D. Smith and Anton Stiglic}, title = {Multiparty computation unconditionally secure against Q{\^{}}2 adversary structures}, journal = {CoRR}, volume = {cs.CR/9902010}, year = {1999}, url = {https://arxiv.org/abs/cs/9902010}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CR-9902010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.