BibTeX records: Adam D. Smith

download as .bib file

@article{DBLP:journals/ncs/0001SC23,
  author       = {Da Yan and
                  Adam D. Smith and
                  Cheng{-}Chien Chen},
  title        = {Structure prediction and materials design with generative neural networks},
  journal      = {Nat. Comput. Sci.},
  volume       = {3},
  number       = {7},
  pages        = {572--574},
  year         = {2023},
  url          = {https://doi.org/10.1038/s43588-023-00471-w},
  doi          = {10.1038/S43588-023-00471-W},
  timestamp    = {Fri, 05 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ncs/0001SC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CohenSSV23,
  author       = {Aloni Cohen and
                  Adam D. Smith and
                  Marika Swanberg and
                  Prashant Nalini Vasudevan},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Control, Confidentiality, and the Right to be Forgotten},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {3358--3372},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3616585},
  doi          = {10.1145/3576915.3616585},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CohenSSV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colt/BrownHS23,
  author       = {Gavin Brown and
                  Samuel B. Hopkins and
                  Adam D. Smith},
  editor       = {Gergely Neu and
                  Lorenzo Rosasco},
  title        = {Fast, Sample-Efficient, Affine-Invariant Private Mean and Covariance
                  Estimation for Subgaussian Distributions},
  booktitle    = {The Thirty Sixth Annual Conference on Learning Theory, {COLT} 2023,
                  12-15 July 2023, Bangalore, India},
  series       = {Proceedings of Machine Learning Research},
  volume       = {195},
  pages        = {5578--5579},
  publisher    = {{PMLR}},
  year         = {2023},
  url          = {https://proceedings.mlr.press/v195/brown23a.html},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/colt/BrownHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/EdenLRS23,
  author       = {Talya Eden and
                  Quanquan C. Liu and
                  Sofya Raskhodnikova and
                  Adam D. Smith},
  editor       = {Kousha Etessami and
                  Uriel Feige and
                  Gabriele Puppis},
  title        = {Triangle Counting with Local Edge Differential Privacy},
  booktitle    = {50th International Colloquium on Automata, Languages, and Programming,
                  {ICALP} 2023, July 10-14, 2023, Paderborn, Germany},
  series       = {LIPIcs},
  volume       = {261},
  pages        = {52:1--52:21},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2023},
  url          = {https://doi.org/10.4230/LIPIcs.ICALP.2023.52},
  doi          = {10.4230/LIPICS.ICALP.2023.52},
  timestamp    = {Wed, 05 Jul 2023 16:19:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/EdenLRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/0004RSS23,
  author       = {Palak Jain and
                  Sofya Raskhodnikova and
                  Satchit Sivakumar and
                  Adam D. Smith},
  editor       = {Andreas Krause and
                  Emma Brunskill and
                  Kyunghyun Cho and
                  Barbara Engelhardt and
                  Sivan Sabato and
                  Jonathan Scarlett},
  title        = {The Price of Differential Privacy under Continual Observation},
  booktitle    = {International Conference on Machine Learning, {ICML} 2023, 23-29 July
                  2023, Honolulu, Hawaii, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {202},
  pages        = {14654--14678},
  publisher    = {{PMLR}},
  year         = {2023},
  url          = {https://proceedings.mlr.press/v202/jain23b.html},
  timestamp    = {Mon, 28 Aug 2023 17:23:08 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/0004RSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/0004KRSS23,
  author       = {Palak Jain and
                  Iden Kalemaj and
                  Sofya Raskhodnikova and
                  Satchit Sivakumar and
                  Adam D. Smith},
  editor       = {Alice Oh and
                  Tristan Naumann and
                  Amir Globerson and
                  Kate Saenko and
                  Moritz Hardt and
                  Sergey Levine},
  title        = {Counting Distinct Elements in the Turnstile Model with Differential
                  Privacy under Continual Observation},
  booktitle    = {Advances in Neural Information Processing Systems 36: Annual Conference
                  on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans,
                  LA, USA, December 10 - 16, 2023},
  year         = {2023},
  url          = {http://papers.nips.cc/paper\_files/paper/2023/hash/0ef1afa0daa888d695dcd5e9513bafa3-Abstract-Conference.html},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/0004KRSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pods/KalemajRST23,
  author       = {Iden Kalemaj and
                  Sofya Raskhodnikova and
                  Adam D. Smith and
                  Charalampos E. Tsourakakis},
  editor       = {Floris Geerts and
                  Hung Q. Ngo and
                  Stavros Sintos},
  title        = {Node-Differentially Private Estimation of the Number of Connected
                  Components},
  booktitle    = {Proceedings of the 42nd {ACM} {SIGMOD-SIGACT-SIGAI} Symposium on Principles
                  of Database Systems, {PODS} 2023, Seattle, WA, USA, June 18-23, 2023},
  pages        = {183--194},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3584372.3588671},
  doi          = {10.1145/3584372.3588671},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pods/KalemajRST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/approx/2023,
  editor       = {Nicole Megow and
                  Adam D. Smith},
  title        = {Approximation, Randomization, and Combinatorial Optimization. Algorithms
                  and Techniques, {APPROX/RANDOM} 2023, September 11-13, 2023, Atlanta,
                  Georgia, {USA}},
  series       = {LIPIcs},
  volume       = {275},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2023},
  url          = {https://www.dagstuhl.de/dagpub/978-3-95977-296-9},
  isbn         = {978-3-95977-296-9},
  timestamp    = {Sat, 09 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/approx/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-12250,
  author       = {Gavin Brown and
                  Samuel B. Hopkins and
                  Adam D. Smith},
  title        = {Fast, Sample-Efficient, Affine-Invariant Private Mean and Covariance
                  Estimation for Subgaussian Distributions},
  journal      = {CoRR},
  volume       = {abs/2301.12250},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.12250},
  doi          = {10.48550/ARXIV.2301.12250},
  eprinttype    = {arXiv},
  eprint       = {2301.12250},
  timestamp    = {Tue, 25 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-12250.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-05890,
  author       = {Iden Kalemaj and
                  Sofya Raskhodnikova and
                  Adam D. Smith and
                  Charalampos E. Tsourakakis},
  title        = {Node-Differentially Private Estimation of the Number of Connected
                  Components},
  journal      = {CoRR},
  volume       = {abs/2304.05890},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.05890},
  doi          = {10.48550/ARXIV.2304.05890},
  eprinttype    = {arXiv},
  eprint       = {2304.05890},
  timestamp    = {Wed, 19 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-05890.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-02263,
  author       = {Talya Eden and
                  Quanquan C. Liu and
                  Sofya Raskhodnikova and
                  Adam D. Smith},
  title        = {Triangle Counting with Local Edge Differential Privacy},
  journal      = {CoRR},
  volume       = {abs/2305.02263},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.02263},
  doi          = {10.48550/ARXIV.2305.02263},
  eprinttype    = {arXiv},
  eprint       = {2305.02263},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-02263.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-06723,
  author       = {Palak Jain and
                  Iden Kalemaj and
                  Sofya Raskhodnikova and
                  Satchit Sivakumar and
                  Adam D. Smith},
  title        = {Counting Distinct Elements in the Turnstile Model with Differential
                  Privacy under Continual Observation},
  journal      = {CoRR},
  volume       = {abs/2306.06723},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.06723},
  doi          = {10.48550/ARXIV.2306.06723},
  eprinttype    = {arXiv},
  eprint       = {2306.06723},
  timestamp    = {Fri, 16 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-06723.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/AlabiMSSV22,
  author       = {Daniel Alabi and
                  Audra McMillan and
                  Jayshree Sarathy and
                  Adam D. Smith and
                  Salil P. Vadhan},
  title        = {Differentially Private Simple Linear Regression},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {2},
  pages        = {184--204},
  year         = {2022},
  url          = {https://doi.org/10.2478/popets-2022-0041},
  doi          = {10.2478/POPETS-2022-0041},
  timestamp    = {Sat, 12 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/AlabiMSSV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colt/BrownBS22,
  author       = {Gavin Brown and
                  Mark Bun and
                  Adam D. Smith},
  editor       = {Po{-}Ling Loh and
                  Maxim Raginsky},
  title        = {Strong Memory Lower Bounds for Learning Natural Models},
  booktitle    = {Conference on Learning Theory, 2-5 July 2022, London, {UK}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {178},
  pages        = {4989--5029},
  publisher    = {{PMLR}},
  year         = {2022},
  url          = {https://proceedings.mlr.press/v178/brown22a.html},
  timestamp    = {Tue, 25 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colt/BrownBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/DenisovMRST22,
  author       = {Sergey Denisov and
                  H. Brendan McMahan and
                  John Rush and
                  Adam D. Smith and
                  Abhradeep Guha Thakurta},
  editor       = {Sanmi Koyejo and
                  S. Mohamed and
                  A. Agarwal and
                  Danielle Belgrave and
                  K. Cho and
                  A. Oh},
  title        = {Improved Differential Privacy for {SGD} via Optimal Private Linear
                  Operators on Adaptive Streams},
  booktitle    = {Advances in Neural Information Processing Systems 35: Annual Conference
                  on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans,
                  LA, USA, November 28 - December 9, 2022},
  year         = {2022},
  url          = {http://papers.nips.cc/paper\_files/paper/2022/hash/271ec4d1a9ff5e6b81a6e21d38b1ba96-Abstract-Conference.html},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/DenisovMRST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-04743,
  author       = {Gavin Brown and
                  Mark Bun and
                  Adam D. Smith},
  title        = {Strong Memory Lower Bounds for Learning Natural Models},
  journal      = {CoRR},
  volume       = {abs/2206.04743},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.04743},
  doi          = {10.48550/ARXIV.2206.04743},
  eprinttype    = {arXiv},
  eprint       = {2206.04743},
  timestamp    = {Tue, 25 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-04743.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-07876,
  author       = {Aloni Cohen and
                  Adam D. Smith and
                  Marika Swanberg and
                  Prashant Nalini Vasudevan},
  title        = {Control, Confidentiality, and the Right to be Forgotten},
  journal      = {CoRR},
  volume       = {abs/2210.07876},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.07876},
  doi          = {10.48550/ARXIV.2210.07876},
  eprinttype    = {arXiv},
  eprint       = {2210.07876},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-07876.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-15819,
  author       = {Audra McMillan and
                  Adam D. Smith and
                  Jonathan R. Ullman},
  title        = {Instance-Optimal Differentially Private Estimation},
  journal      = {CoRR},
  volume       = {abs/2210.15819},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.15819},
  doi          = {10.48550/ARXIV.2210.15819},
  eprinttype    = {arXiv},
  eprint       = {2210.15819},
  timestamp    = {Thu, 03 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-15819.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-17520,
  author       = {Adam D. Smith and
                  Abhradeep Thakurta},
  title        = {Fully Adaptive Composition for Gaussian Differential Privacy},
  journal      = {CoRR},
  volume       = {abs/2210.17520},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.17520},
  doi          = {10.48550/ARXIV.2210.17520},
  eprinttype    = {arXiv},
  eprint       = {2210.17520},
  timestamp    = {Thu, 03 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-17520.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-08193,
  author       = {Sofya Raskhodnikova and
                  Satchit Sivakumar and
                  Adam D. Smith and
                  Marika Swanberg},
  title        = {Differentially Private Sampling from Distributions},
  journal      = {CoRR},
  volume       = {abs/2211.08193},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.08193},
  doi          = {10.48550/ARXIV.2211.08193},
  eprinttype    = {arXiv},
  eprint       = {2211.08193},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-08193.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CanettiFPRS21,
  author       = {Ran Canetti and
                  Benjamin Fuller and
                  Omer Paneth and
                  Leonid Reyzin and
                  Adam D. Smith},
  title        = {Reusable Fuzzy Extractors for Low-Entropy Distributions},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {1},
  pages        = {2},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-020-09367-8},
  doi          = {10.1007/S00145-020-09367-8},
  timestamp    = {Fri, 04 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/CanettiFPRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/CheuSU21,
  author       = {Albert Cheu and
                  Adam D. Smith and
                  Jonathan R. Ullman},
  title        = {Manipulation Attacks in Local Differential Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {11},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.29012/jpc.754},
  doi          = {10.29012/JPC.754},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/CheuSU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/BassilyNSSSU21,
  author       = {Raef Bassily and
                  Kobbi Nissim and
                  Adam D. Smith and
                  Thomas Steinke and
                  Uri Stemmer and
                  Jonathan R. Ullman},
  title        = {Algorithmic Stability for Adaptive Data Analysis},
  journal      = {{SIAM} J. Comput.},
  volume       = {50},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.1137/16M1103646},
  doi          = {10.1137/16M1103646},
  timestamp    = {Wed, 14 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/BassilyNSSSU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/ReyzinSY21,
  author       = {Leonid Reyzin and
                  Adam D. Smith and
                  Sophia Yakoubov},
  editor       = {Shlomi Dolev and
                  Oded Margalit and
                  Benny Pinkas and
                  Alexander A. Schwarzmann},
  title        = {Turning {HATE} into {LOVE:} Compact Homomorphic Ad Hoc Threshold Encryption
                  for Scalable {MPC}},
  booktitle    = {Cyber Security Cryptography and Machine Learning - 5th International
                  Symposium, {CSCML} 2021, Be'er Sheva, Israel, July 8-9, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12716},
  pages        = {361--378},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78086-9\_27},
  doi          = {10.1007/978-3-030-78086-9\_27},
  timestamp    = {Mon, 03 Jan 2022 22:32:47 +0100},
  biburl       = {https://dblp.org/rec/conf/cscml/ReyzinSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/BrownGSUZ21,
  author       = {Gavin Brown and
                  Marco Gaboardi and
                  Adam D. Smith and
                  Jonathan R. Ullman and
                  Lydia Zakynthinou},
  editor       = {Marc'Aurelio Ranzato and
                  Alina Beygelzimer and
                  Yann N. Dauphin and
                  Percy Liang and
                  Jennifer Wortman Vaughan},
  title        = {Covariance-Aware Private Mean Estimation Without Private Covariance
                  Estimation},
  booktitle    = {Advances in Neural Information Processing Systems 34: Annual Conference
                  on Neural Information Processing Systems 2021, NeurIPS 2021, December
                  6-14, 2021, virtual},
  pages        = {7950--7964},
  year         = {2021},
  url          = {https://proceedings.neurips.cc/paper/2021/hash/42778ef0b5805a96f9511e20b5611fce-Abstract.html},
  timestamp    = {Tue, 25 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/BrownGSUZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/RaskhodnikovaSS21,
  author       = {Sofya Raskhodnikova and
                  Satchit Sivakumar and
                  Adam D. Smith and
                  Marika Swanberg},
  editor       = {Marc'Aurelio Ranzato and
                  Alina Beygelzimer and
                  Yann N. Dauphin and
                  Percy Liang and
                  Jennifer Wortman Vaughan},
  title        = {Differentially Private Sampling from Distributions},
  booktitle    = {Advances in Neural Information Processing Systems 34: Annual Conference
                  on Neural Information Processing Systems 2021, NeurIPS 2021, December
                  6-14, 2021, virtual},
  pages        = {28983--28994},
  year         = {2021},
  url          = {https://proceedings.neurips.cc/paper/2021/hash/f2b5e92f61b6de923b063588ee6e7c48-Abstract.html},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/RaskhodnikovaSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/JainRSST21,
  author       = {Prateek Jain and
                  John Rush and
                  Adam D. Smith and
                  Shuang Song and
                  Abhradeep Guha Thakurta},
  editor       = {Marc'Aurelio Ranzato and
                  Alina Beygelzimer and
                  Yann N. Dauphin and
                  Percy Liang and
                  Jennifer Wortman Vaughan},
  title        = {Differentially Private Model Personalization},
  booktitle    = {Advances in Neural Information Processing Systems 34: Annual Conference
                  on Neural Information Processing Systems 2021, NeurIPS 2021, December
                  6-14, 2021, virtual},
  pages        = {29723--29735},
  year         = {2021},
  url          = {https://proceedings.neurips.cc/paper/2021/hash/f8580959e35cb0934479bb007fb241c2-Abstract.html},
  timestamp    = {Tue, 03 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/JainRSST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CheuSU21,
  author       = {Albert Cheu and
                  Adam D. Smith and
                  Jonathan R. Ullman},
  title        = {Manipulation Attacks in Local Differential Privacy},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {883--900},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00001},
  doi          = {10.1109/SP40001.2021.00001},
  timestamp    = {Thu, 21 Sep 2023 15:57:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/CheuSU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BrownBFST21,
  author       = {Gavin Brown and
                  Mark Bun and
                  Vitaly Feldman and
                  Adam D. Smith and
                  Kunal Talwar},
  editor       = {Samir Khuller and
                  Virginia Vassilevska Williams},
  title        = {When is memorization of irrelevant training data necessary for high-accuracy
                  learning?},
  booktitle    = {{STOC} '21: 53rd Annual {ACM} {SIGACT} Symposium on Theory of Computing,
                  Virtual Event, Italy, June 21-25, 2021},
  pages        = {123--132},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3406325.3451131},
  doi          = {10.1145/3406325.3451131},
  timestamp    = {Tue, 25 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/BrownBFST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-10333,
  author       = {J{\"{o}}rg Drechsler and
                  Ira Globus{-}Harris and
                  Audra McMillan and
                  Jayshree Sarathy and
                  Adam D. Smith},
  title        = {Non-parametric Differentially Private Confidence Intervals for the
                  Median},
  journal      = {CoRR},
  volume       = {abs/2106.10333},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.10333},
  eprinttype    = {arXiv},
  eprint       = {2106.10333},
  timestamp    = {Tue, 29 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-10333.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-13329,
  author       = {Gavin Brown and
                  Marco Gaboardi and
                  Adam D. Smith and
                  Jonathan R. Ullman and
                  Lydia Zakynthinou},
  title        = {Covariance-Aware Private Mean Estimation Without Private Covariance
                  Estimation},
  journal      = {CoRR},
  volume       = {abs/2106.13329},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.13329},
  eprinttype    = {arXiv},
  eprint       = {2106.13329},
  timestamp    = {Tue, 25 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-13329.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-00828,
  author       = {Palak Jain and
                  Sofya Raskhodnikova and
                  Satchit Sivakumar and
                  Adam D. Smith},
  title        = {The Price of Differential Privacy under Continual Observation},
  journal      = {CoRR},
  volume       = {abs/2112.00828},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.00828},
  eprinttype    = {arXiv},
  eprint       = {2112.00828},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-00828.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmlr/0015GS020,
  author       = {Di Wang and
                  Marco Gaboardi and
                  Adam D. Smith and
                  Jinhui Xu},
  title        = {Empirical Risk Minimization in the Non-interactive Local Model of
                  Differential Privacy},
  journal      = {J. Mach. Learn. Res.},
  volume       = {21},
  pages        = {200:1--200:39},
  year         = {2020},
  url          = {http://jmlr.org/papers/v21/19-253.html},
  timestamp    = {Tue, 12 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmlr/0015GS020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/FullerRS20,
  author       = {Benjamin Fuller and
                  Leonid Reyzin and
                  Adam D. Smith},
  title        = {When Are Fuzzy Extractors Possible?},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {66},
  number       = {8},
  pages        = {5282--5298},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIT.2020.2984751},
  doi          = {10.1109/TIT.2020.2984751},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/FullerRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aistats/00020SS0W20,
  author       = {Ryan Rogers and
                  Aaron Roth and
                  Adam D. Smith and
                  Nathan Srebro and
                  Om Thakkar and
                  Blake E. Woodworth},
  editor       = {Silvia Chiappa and
                  Roberto Calandra},
  title        = {Guaranteed Validity for Empirical Approaches to Adaptive Data Analysis},
  booktitle    = {The 23rd International Conference on Artificial Intelligence and Statistics,
                  {AISTATS} 2020, 26-28 August 2020, Online [Palermo, Sicily, Italy]},
  series       = {Proceedings of Machine Learning Research},
  volume       = {108},
  pages        = {2830--2840},
  publisher    = {{PMLR}},
  year         = {2020},
  url          = {http://proceedings.mlr.press/v108/rogers20a.html},
  timestamp    = {Mon, 29 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aistats/00020SS0W20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/Smith0T20,
  author       = {Adam D. Smith and
                  Shuang Song and
                  Abhradeep Thakurta},
  editor       = {Hugo Larochelle and
                  Marc'Aurelio Ranzato and
                  Raia Hadsell and
                  Maria{-}Florina Balcan and
                  Hsuan{-}Tien Lin},
  title        = {The Flajolet-Martin Sketch Itself Preserves Differential Privacy:
                  Private Counting with Minimal Space},
  booktitle    = {Advances in Neural Information Processing Systems 33: Annual Conference
                  on Neural Information Processing Systems 2020, NeurIPS 2020, December
                  6-12, 2020, virtual},
  year         = {2020},
  url          = {https://proceedings.neurips.cc/paper/2020/hash/e3019767b1b23f82883c9850356b71d6-Abstract.html},
  timestamp    = {Tue, 19 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/Smith0T20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icits/2020,
  editor       = {Yael Tauman Kalai and
                  Adam D. Smith and
                  Daniel Wichs},
  title        = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020,
                  June 17-19, 2020, Boston, MA, {USA}},
  series       = {LIPIcs},
  volume       = {163},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://www.dagstuhl.de/dagpub/978-3-95977-151-1},
  isbn         = {978-3-95977-151-1},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-05157,
  author       = {Daniel Alabi and
                  Audra McMillan and
                  Jayshree Sarathy and
                  Adam D. Smith and
                  Salil P. Vadhan},
  title        = {Differentially Private Simple Linear Regression},
  journal      = {CoRR},
  volume       = {abs/2007.05157},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.05157},
  eprinttype    = {arXiv},
  eprint       = {2007.05157},
  timestamp    = {Mon, 20 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-05157.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-05934,
  author       = {Di Wang and
                  Marco Gaboardi and
                  Adam D. Smith and
                  Jinhui Xu},
  title        = {Empirical Risk Minimization in the Non-interactive Local Model of
                  Differential Privacy},
  journal      = {CoRR},
  volume       = {abs/2011.05934},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.05934},
  eprinttype    = {arXiv},
  eprint       = {2011.05934},
  timestamp    = {Tue, 12 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-05934.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-06421,
  author       = {Gavin Brown and
                  Mark Bun and
                  Vitaly Feldman and
                  Adam D. Smith and
                  Kunal Talwar},
  title        = {When is Memorization of Irrelevant Training Data Necessary for High-Accuracy
                  Learning?},
  journal      = {CoRR},
  volume       = {abs/2012.06421},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.06421},
  eprinttype    = {arXiv},
  eprint       = {2012.06421},
  timestamp    = {Tue, 25 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-06421.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/alt/WangS019,
  author       = {Di Wang and
                  Adam D. Smith and
                  Jinhui Xu},
  editor       = {Aur{\'{e}}lien Garivier and
                  Satyen Kale},
  title        = {Noninteractive Locally Private Learning of Linear Models via Polynomial
                  Approximations},
  booktitle    = {Algorithmic Learning Theory, {ALT} 2019, 22-24 March 2019, Chicago,
                  Illinois, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {98},
  pages        = {897--902},
  publisher    = {{PMLR}},
  year         = {2019},
  url          = {http://proceedings.mlr.press/v98/wang19c.html},
  timestamp    = {Tue, 12 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/alt/WangS019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CheuSUZZ19,
  author       = {Albert Cheu and
                  Adam D. Smith and
                  Jonathan R. Ullman and
                  David Zeber and
                  Maxim Zhilyaev},
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {Distributed Differential Privacy via Shuffling},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11476},
  pages        = {375--403},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17653-2\_13},
  doi          = {10.1007/978-3-030-17653-2\_13},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CheuSUZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fat/CanettiCDRSS19,
  author       = {Ran Canetti and
                  Aloni Cohen and
                  Nishanth Dikkala and
                  Govind Ramnarayan and
                  Sarah Scheffler and
                  Adam D. Smith},
  editor       = {danah boyd and
                  Jamie H. Morgenstern},
  title        = {From Soft Classifiers to Hard Decisions: How fair can we be?},
  booktitle    = {Proceedings of the Conference on Fairness, Accountability, and Transparency,
                  FAT* 2019, Atlanta, GA, USA, January 29-31, 2019},
  pages        = {309--318},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3287560.3287561},
  doi          = {10.1145/3287560.3287561},
  timestamp    = {Fri, 26 Mar 2021 16:46:37 +0100},
  biburl       = {https://dblp.org/rec/conf/fat/CanettiCDRSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/CanonneKMSU19,
  author       = {Cl{\'{e}}ment L. Canonne and
                  Gautam Kamath and
                  Audra McMillan and
                  Adam D. Smith and
                  Jonathan R. Ullman},
  editor       = {Moses Charikar and
                  Edith Cohen},
  title        = {The structure of optimal private tests for simple hypotheses},
  booktitle    = {Proceedings of the 51st Annual {ACM} {SIGACT} Symposium on Theory
                  of Computing, {STOC} 2019, Phoenix, AZ, USA, June 23-26, 2019},
  pages        = {310--321},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3313276.3316336},
  doi          = {10.1145/3313276.3316336},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/CanonneKMSU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-09231,
  author       = {Ryan Rogers and
                  Aaron Roth and
                  Adam D. Smith and
                  Nathan Srebro and
                  Om Thakkar and
                  Blake E. Woodworth},
  title        = {Guaranteed Validity for Empirical Approaches to Adaptive Data Analysis},
  journal      = {CoRR},
  volume       = {abs/1906.09231},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.09231},
  eprinttype    = {arXiv},
  eprint       = {1906.09231},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-09231.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-09630,
  author       = {Albert Cheu and
                  Adam D. Smith and
                  Jonathan R. Ullman},
  title        = {Manipulation Attacks in Local Differential Privacy},
  journal      = {CoRR},
  volume       = {abs/1909.09630},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.09630},
  eprinttype    = {arXiv},
  eprint       = {1909.09630},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-09630.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CheuSUZZ19,
  author       = {Albert Cheu and
                  Adam D. Smith and
                  Jonathan R. Ullman and
                  David Zeber and
                  Maxim Zhilyaev},
  title        = {Distributed Differential Privacy via Shuffling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {245},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/245},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CheuSUZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/BorgsCSZ18,
  author       = {Christian Borgs and
                  Jennifer T. Chayes and
                  Adam D. Smith and
                  Ilias Zadik},
  editor       = {Mikkel Thorup},
  title        = {Revealing Network Structure, Confidentially: Improved Rates for Node-Private
                  Graphon Estimation},
  booktitle    = {59th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
                  2018, Paris, France, October 7-9, 2018},
  pages        = {533--543},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/FOCS.2018.00057},
  doi          = {10.1109/FOCS.2018.00057},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/BorgsCSZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/UllmanSNSS18,
  author       = {Jonathan R. Ullman and
                  Adam D. Smith and
                  Kobbi Nissim and
                  Uri Stemmer and
                  Thomas Steinke},
  editor       = {Samy Bengio and
                  Hanna M. Wallach and
                  Hugo Larochelle and
                  Kristen Grauman and
                  Nicol{\`{o}} Cesa{-}Bianchi and
                  Roman Garnett},
  title        = {The Limits of Post-Selection Generalization},
  booktitle    = {Advances in Neural Information Processing Systems 31: Annual Conference
                  on Neural Information Processing Systems 2018, NeurIPS 2018, December
                  3-8, 2018, Montr{\'{e}}al, Canada},
  pages        = {6402--6411},
  year         = {2018},
  url          = {https://proceedings.neurips.cc/paper/2018/hash/77ee3bc58ce560b86c2b59363281e914-Abstract.html},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/UllmanSNSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/WoodworthWSMS18,
  author       = {Blake E. Woodworth and
                  Jialei Wang and
                  Adam D. Smith and
                  Brendan McMahan and
                  Nati Srebro},
  editor       = {Samy Bengio and
                  Hanna M. Wallach and
                  Hugo Larochelle and
                  Kristen Grauman and
                  Nicol{\`{o}} Cesa{-}Bianchi and
                  Roman Garnett},
  title        = {Graph Oracle Models, Lower Bounds, and Gaps for Parallel Stochastic
                  Optimization},
  booktitle    = {Advances in Neural Information Processing Systems 31: Annual Conference
                  on Neural Information Processing Systems 2018, NeurIPS 2018, December
                  3-8, 2018, Montr{\'{e}}al, Canada},
  pages        = {8505--8515},
  year         = {2018},
  url          = {https://proceedings.neurips.cc/paper/2018/hash/3ec27c2cff04bc5fd2586ca36c62044e-Abstract.html},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/WoodworthWSMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-06100,
  author       = {Kobbi Nissim and
                  Adam D. Smith and
                  Thomas Steinke and
                  Uri Stemmer and
                  Jonathan R. Ullman},
  title        = {The Limits of Post-Selection Generalization},
  journal      = {CoRR},
  volume       = {abs/1806.06100},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.06100},
  eprinttype    = {arXiv},
  eprint       = {1806.06100},
  timestamp    = {Sun, 14 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-06100.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-01394,
  author       = {Albert Cheu and
                  Adam D. Smith and
                  Jonathan R. Ullman and
                  David Zeber and
                  Maxim Zhilyaev},
  title        = {Distributed Differential Privacy via Mixnets},
  journal      = {CoRR},
  volume       = {abs/1808.01394},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.01394},
  eprinttype    = {arXiv},
  eprint       = {1808.01394},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-01394.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-02003,
  author       = {Ran Canetti and
                  Aloni Cohen and
                  Nishanth Dikkala and
                  Govind Ramnarayan and
                  Sarah Scheffler and
                  Adam D. Smith},
  title        = {From Soft Classifiers to Hard Decisions: How fair can we be?},
  journal      = {CoRR},
  volume       = {abs/1810.02003},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.02003},
  eprinttype    = {arXiv},
  eprint       = {1810.02003},
  timestamp    = {Tue, 30 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-02003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-02183,
  author       = {Christian Borgs and
                  Jennifer T. Chayes and
                  Adam D. Smith and
                  Ilias Zadik},
  title        = {Revealing Network Structure, Confidentially: Improved Rates for Node-Private
                  Graphon Estimation},
  journal      = {CoRR},
  volume       = {abs/1810.02183},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.02183},
  eprinttype    = {arXiv},
  eprint       = {1810.02183},
  timestamp    = {Thu, 01 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-02183.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-12518,
  author       = {Christian Borgs and
                  Jennifer T. Chayes and
                  Adam D. Smith and
                  Ilias Zadik},
  title        = {Private Algorithms Can Always Be Extended},
  journal      = {CoRR},
  volume       = {abs/1810.12518},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.12518},
  eprinttype    = {arXiv},
  eprint       = {1810.12518},
  timestamp    = {Thu, 08 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-12518.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-11148,
  author       = {Cl{\'{e}}ment L. Canonne and
                  Gautam Kamath and
                  Audra McMillan and
                  Adam D. Smith and
                  Jonathan R. Ullman},
  title        = {The Structure of Optimal Private Tests for Simple Hypotheses},
  journal      = {CoRR},
  volume       = {abs/1811.11148},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.11148},
  eprinttype    = {arXiv},
  eprint       = {1811.11148},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-11148.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-06825,
  author       = {Di Wang and
                  Adam D. Smith and
                  Jinhui Xu},
  title        = {Differentially Private Empirical Risk Minimization in Non-interactive
                  Local Model via Polynomial of Inner Product Approximation},
  journal      = {CoRR},
  volume       = {abs/1812.06825},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.06825},
  eprinttype    = {arXiv},
  eprint       = {1812.06825},
  timestamp    = {Tue, 12 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-06825.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReyzinSY18,
  author       = {Leonid Reyzin and
                  Adam D. Smith and
                  Sophia Yakoubov},
  title        = {Turning {HATE} Into {LOVE:} Homomorphic Ad Hoc Threshold Encryption
                  for Scalable {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {997},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/997},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReyzinSY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KiltzOS17,
  author       = {Eike Kiltz and
                  Adam O'Neill and
                  Adam D. Smith},
  title        = {Instantiability of {RSA-OAEP} Under Chosen-Plaintext Attack},
  journal      = {J. Cryptol.},
  volume       = {30},
  number       = {3},
  pages        = {889--919},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00145-016-9238-4},
  doi          = {10.1007/S00145-016-9238-4},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KiltzOS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SmithTU17,
  author       = {Adam D. Smith and
                  Abhradeep Thakurta and
                  Jalaj Upadhyay},
  title        = {Is Interaction Necessary for Distributed Private Learning?},
  booktitle    = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
                  CA, USA, May 22-26, 2017},
  pages        = {58--77},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SP.2017.35},
  doi          = {10.1109/SP.2017.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/SmithTU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Smith17b,
  author       = {Adam D. Smith},
  title        = {Information, Privacy and Stability in Adaptive Data Analysis},
  journal      = {CoRR},
  volume       = {abs/1706.00820},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.00820},
  eprinttype    = {arXiv},
  eprint       = {1706.00820},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Smith17b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/GuruswamiS16,
  author       = {Venkatesan Guruswami and
                  Adam D. Smith},
  title        = {Optimal Rate Code Constructions for Computationally Simple Channels},
  journal      = {J. {ACM}},
  volume       = {63},
  number       = {4},
  pages        = {35:1--35:37},
  year         = {2016},
  url          = {https://doi.org/10.1145/2936015},
  doi          = {10.1145/2936015},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/GuruswamiS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/DworkMNS16,
  author       = {Cynthia Dwork and
                  Frank McSherry and
                  Kobbi Nissim and
                  Adam D. Smith},
  title        = {Calibrating Noise to Sensitivity in Private Data Analysis},
  journal      = {J. Priv. Confidentiality},
  volume       = {7},
  number       = {3},
  pages        = {17--51},
  year         = {2016},
  url          = {https://doi.org/10.29012/jpc.v7i3.405},
  doi          = {10.29012/JPC.V7I3.405},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/DworkMNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FullerRS16,
  author       = {Benjamin Fuller and
                  Leonid Reyzin and
                  Adam D. Smith},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {When Are Fuzzy Extractors Possible?},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {277--306},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_10},
  doi          = {10.1007/978-3-662-53887-6\_10},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FullerRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CanettiFPRS16,
  author       = {Ran Canetti and
                  Benjamin Fuller and
                  Omer Paneth and
                  Leonid Reyzin and
                  Adam D. Smith},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Reusable Fuzzy Extractors for Low-Entropy Distributions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9665},
  pages        = {117--146},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49890-3\_5},
  doi          = {10.1007/978-3-662-49890-3\_5},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CanettiFPRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/RogersRST16,
  author       = {Ryan M. Rogers and
                  Aaron Roth and
                  Adam D. Smith and
                  Om Thakkar},
  editor       = {Irit Dinur},
  title        = {Max-Information, Differential Privacy, and Post-selection Hypothesis
                  Testing},
  booktitle    = {{IEEE} 57th Annual Symposium on Foundations of Computer Science, {FOCS}
                  2016, 9-11 October 2016, Hyatt Regency, New Brunswick, New Jersey,
                  {USA}},
  pages        = {487--494},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/FOCS.2016.59},
  doi          = {10.1109/FOCS.2016.59},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/focs/RogersRST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/RaskhodnikovaS16,
  author       = {Sofya Raskhodnikova and
                  Adam D. Smith},
  editor       = {Irit Dinur},
  title        = {Lipschitz Extensions for Node-Private Graph Statistics and the Generalized
                  Exponential Mechanism},
  booktitle    = {{IEEE} 57th Annual Symposium on Foundations of Computer Science, {FOCS}
                  2016, 9-11 October 2016, Hyatt Regency, New Brunswick, New Jersey,
                  {USA}},
  pages        = {495--504},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/FOCS.2016.60},
  doi          = {10.1109/FOCS.2016.60},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/RaskhodnikovaS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BassilyNSSSU16,
  author       = {Raef Bassily and
                  Kobbi Nissim and
                  Adam D. Smith and
                  Thomas Steinke and
                  Uri Stemmer and
                  Jonathan R. Ullman},
  editor       = {Daniel Wichs and
                  Yishay Mansour},
  title        = {Algorithmic stability for adaptive data analysis},
  booktitle    = {Proceedings of the 48th Annual {ACM} {SIGACT} Symposium on Theory
                  of Computing, {STOC} 2016, Cambridge, MA, USA, June 18-21, 2016},
  pages        = {1046--1059},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897518.2897566},
  doi          = {10.1145/2897518.2897566},
  timestamp    = {Sun, 14 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/BassilyNSSSU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2016b1,
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4},
  doi          = {10.1007/978-3-662-53641-4},
  isbn         = {978-3-662-53640-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2016b1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2016b2,
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5},
  doi          = {10.1007/978-3-662-53644-5},
  isbn         = {978-3-662-53643-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2016b2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/algo/RaskhodnikovaS16,
  author       = {Sofya Raskhodnikova and
                  Adam D. Smith},
  title        = {Differentially Private Analysis of Graphs},
  booktitle    = {Encyclopedia of Algorithms},
  pages        = {543--547},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-1-4939-2864-4\_549},
  doi          = {10.1007/978-1-4939-2864-4\_549},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/algo/RaskhodnikovaS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/McMillanS16,
  author       = {Audra McMillan and
                  Adam D. Smith},
  title        = {When is Nontrivial Estimation Possible for Graphons and Stochastic
                  Block Models?},
  journal      = {CoRR},
  volume       = {abs/1604.01871},
  year         = {2016},
  url          = {http://arxiv.org/abs/1604.01871},
  eprinttype    = {arXiv},
  eprint       = {1604.01871},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/McMillanS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RogersRST16,
  author       = {Ryan M. Rogers and
                  Aaron Roth and
                  Adam D. Smith and
                  Om Thakkar},
  title        = {Max-Information, Differential Privacy, and Post-Selection Hypothesis
                  Testing},
  journal      = {CoRR},
  volume       = {abs/1604.03924},
  year         = {2016},
  url          = {http://arxiv.org/abs/1604.03924},
  eprinttype    = {arXiv},
  eprint       = {1604.03924},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/RogersRST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GentryGIPSS15,
  author       = {Craig Gentry and
                  Jens Groth and
                  Yuval Ishai and
                  Chris Peikert and
                  Amit Sahai and
                  Adam D. Smith},
  title        = {Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative
                  Zero-Knowledge Proofs},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {4},
  pages        = {820--843},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00145-014-9184-y},
  doi          = {10.1007/S00145-014-9184-Y},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/GentryGIPSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/DworkSSUV15,
  author       = {Cynthia Dwork and
                  Adam D. Smith and
                  Thomas Steinke and
                  Jonathan R. Ullman and
                  Salil P. Vadhan},
  editor       = {Venkatesan Guruswami},
  title        = {Robust Traceability from Trace Amounts},
  booktitle    = {{IEEE} 56th Annual Symposium on Foundations of Computer Science, {FOCS}
                  2015, Berkeley, CA, USA, 17-20 October, 2015},
  pages        = {650--669},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/FOCS.2015.46},
  doi          = {10.1109/FOCS.2015.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/DworkSSUV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/BlumMSS15,
  author       = {Avrim Blum and
                  Jamie Morgenstern and
                  Ankit Sharma and
                  Adam D. Smith},
  editor       = {Tim Roughgarden},
  title        = {Privacy-Preserving Public Information for Sequential Games},
  booktitle    = {Proceedings of the 2015 Conference on Innovations in Theoretical Computer
                  Science, {ITCS} 2015, Rehovot, Israel, January 11-13, 2015},
  pages        = {173--180},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2688073.2688100},
  doi          = {10.1145/2688073.2688100},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/BlumMSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/BorgsCS15,
  author       = {Christian Borgs and
                  Jennifer T. Chayes and
                  Adam D. Smith},
  editor       = {Corinna Cortes and
                  Neil D. Lawrence and
                  Daniel D. Lee and
                  Masashi Sugiyama and
                  Roman Garnett},
  title        = {Private Graphon Estimation for Sparse Graphs},
  booktitle    = {Advances in Neural Information Processing Systems 28: Annual Conference
                  on Neural Information Processing Systems 2015, December 7-12, 2015,
                  Montreal, Quebec, Canada},
  pages        = {1369--1377},
  year         = {2015},
  url          = {https://proceedings.neurips.cc/paper/2015/hash/7250eb93b3c18cc9daa29cf58af7a004-Abstract.html},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/BorgsCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BassilyS15,
  author       = {Raef Bassily and
                  Adam D. Smith},
  editor       = {Rocco A. Servedio and
                  Ronitt Rubinfeld},
  title        = {Local, Private, Efficient Protocols for Succinct Histograms},
  booktitle    = {Proceedings of the Forty-Seventh Annual {ACM} on Symposium on Theory
                  of Computing, {STOC} 2015, Portland, OR, USA, June 14-17, 2015},
  pages        = {127--135},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2746539.2746632},
  doi          = {10.1145/2746539.2746632},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/BassilyS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/SmithZ15,
  author       = {Adam D. Smith and
                  Ye Zhang},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {On the Regularity of Lossy {RSA} - Improved Bounds and Applications
                  to Padding-Based Encryption},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {609--628},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_25},
  doi          = {10.1007/978-3-662-46494-6\_25},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/SmithZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BassilyS15,
  author       = {Raef Bassily and
                  Adam D. Smith},
  title        = {Local, Private, Efficient Protocols for Succinct Histograms},
  journal      = {CoRR},
  volume       = {abs/1504.04686},
  year         = {2015},
  url          = {http://arxiv.org/abs/1504.04686},
  eprinttype    = {arXiv},
  eprint       = {1504.04686},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BassilyS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RaskhodnikovaS15,
  author       = {Sofya Raskhodnikova and
                  Adam D. Smith},
  title        = {Efficient Lipschitz Extensions for High-Dimensional Graph Statistics
                  and Node Private Degree Distributions},
  journal      = {CoRR},
  volume       = {abs/1504.07912},
  year         = {2015},
  url          = {http://arxiv.org/abs/1504.07912},
  eprinttype    = {arXiv},
  eprint       = {1504.07912},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RaskhodnikovaS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BorgsCS15,
  author       = {Christian Borgs and
                  Jennifer T. Chayes and
                  Adam D. Smith},
  title        = {Private Graphon Estimation for Sparse Graphs},
  journal      = {CoRR},
  volume       = {abs/1506.06162},
  year         = {2015},
  url          = {http://arxiv.org/abs/1506.06162},
  eprinttype    = {arXiv},
  eprint       = {1506.06162},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BorgsCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HallgrenS015,
  author       = {Sean Hallgren and
                  Adam D. Smith and
                  Fang Song},
  title        = {Classical Cryptographic Protocols in a Quantum World},
  journal      = {CoRR},
  volume       = {abs/1507.01625},
  year         = {2015},
  url          = {http://arxiv.org/abs/1507.01625},
  eprinttype    = {arXiv},
  eprint       = {1507.01625},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HallgrenS015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BassilyNSSSU15,
  author       = {Raef Bassily and
                  Kobbi Nissim and
                  Adam D. Smith and
                  Thomas Steinke and
                  Uri Stemmer and
                  Jonathan R. Ullman},
  title        = {Algorithmic Stability for Adaptive Data Analysis},
  journal      = {CoRR},
  volume       = {abs/1511.02513},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.02513},
  eprinttype    = {arXiv},
  eprint       = {1511.02513},
  timestamp    = {Sun, 14 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/BassilyNSSSU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SmithZ15,
  author       = {Adam D. Smith and
                  Ye Zhang},
  title        = {On the Regularity of Lossy {RSA:} Improved Bounds and Applications
                  to Padding-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SmithZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HallgrenS015,
  author       = {Sean Hallgren and
                  Adam D. Smith and
                  Fang Song},
  title        = {Classical Cryptographic Protocols in a Quantum World},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {687},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/687},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HallgrenS015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/Kasiviswanathan14,
  author       = {Shiva Prasad Kasiviswanathan and
                  Adam D. Smith},
  title        = {On the 'Semantics' of Differential Privacy: {A} Bayesian Formulation},
  journal      = {J. Priv. Confidentiality},
  volume       = {6},
  number       = {1},
  year         = {2014},
  url          = {https://doi.org/10.29012/jpc.v6i1.634},
  doi          = {10.29012/JPC.V6I1.634},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpc/Kasiviswanathan14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tods/KarwaRSY14,
  author       = {Vishesh Karwa and
                  Sofya Raskhodnikova and
                  Adam D. Smith and
                  Grigory Yaroslavtsev},
  title        = {Private Analysis of Graph Structure},
  journal      = {{ACM} Trans. Database Syst.},
  volume       = {39},
  number       = {3},
  pages        = {22:1--22:33},
  year         = {2014},
  url          = {https://doi.org/10.1145/2611523},
  doi          = {10.1145/2611523},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tods/KarwaRSY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/BassilyST14,
  author       = {Raef Bassily and
                  Adam D. Smith and
                  Abhradeep Thakurta},
  title        = {Private Empirical Risk Minimization: Efficient Algorithms and Tight
                  Error Bounds},
  booktitle    = {55th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
                  2014, Philadelphia, PA, USA, October 18-21, 2014},
  pages        = {464--473},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/FOCS.2014.56},
  doi          = {10.1109/FOCS.2014.56},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/BassilyST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/BassilyS14,
  author       = {Raef Bassily and
                  Adam D. Smith},
  editor       = {Chandra Chekuri},
  title        = {Causal Erasure Channels},
  booktitle    = {Proceedings of the Twenty-Fifth Annual {ACM-SIAM} Symposium on Discrete
                  Algorithms, {SODA} 2014, Portland, Oregon, USA, January 5-7, 2014},
  pages        = {1844--1857},
  publisher    = {{SIAM}},
  year         = {2014},
  url          = {https://doi.org/10.1137/1.9781611973402.133},
  doi          = {10.1137/1.9781611973402.133},
  timestamp    = {Tue, 02 Feb 2021 17:07:40 +0100},
  biburl       = {https://dblp.org/rec/conf/soda/BassilyS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BlumMSS14,
  author       = {Avrim Blum and
                  Jamie Morgenstern and
                  Ankit Sharma and
                  Adam D. Smith},
  title        = {Privacy-Preserving Public Information for Sequential Games},
  journal      = {CoRR},
  volume       = {abs/1402.4488},
  year         = {2014},
  url          = {http://arxiv.org/abs/1402.4488},
  eprinttype    = {arXiv},
  eprint       = {1402.4488},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BlumMSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BassilyST14,
  author       = {Raef Bassily and
                  Adam D. Smith and
                  Abhradeep Thakurta},
  title        = {Private Empirical Risk Minimization, Revisited},
  journal      = {CoRR},
  volume       = {abs/1405.7085},
  year         = {2014},
  url          = {http://arxiv.org/abs/1405.7085},
  eprinttype    = {arXiv},
  eprint       = {1405.7085},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BassilyST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BassilyS14,
  author       = {Raef Bassily and
                  Adam D. Smith},
  title        = {Causal Erasure Channels},
  journal      = {CoRR},
  volume       = {abs/1409.3893},
  year         = {2014},
  url          = {http://arxiv.org/abs/1409.3893},
  eprinttype    = {arXiv},
  eprint       = {1409.3893},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BassilyS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FullerSR14,
  author       = {Benjamin Fuller and
                  Adam D. Smith and
                  Leonid Reyzin},
  title        = {Where are Fuzzy Extractors Possible?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {961},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/961},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FullerSR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/RaskhodnikovaRRS13,
  author       = {Sofya Raskhodnikova and
                  Dana Ron and
                  Ronitt Rubinfeld and
                  Adam D. Smith},
  title        = {Sublinear Algorithms for Approximating String Compressibility},
  journal      = {Algorithmica},
  volume       = {65},
  number       = {3},
  pages        = {685--709},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00453-012-9618-6},
  doi          = {10.1007/S00453-012-9618-6},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/algorithmica/RaskhodnikovaRRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colt/ThakurtaS13,
  author       = {Abhradeep Thakurta and
                  Adam D. Smith},
  editor       = {Shai Shalev{-}Shwartz and
                  Ingo Steinwart},
  title        = {Differentially Private Feature Selection via Stability Arguments,
                  and the Robustness of the Lasso},
  booktitle    = {{COLT} 2013 - The 26th Annual Conference on Learning Theory, June
                  12-14, 2013, Princeton University, NJ, {USA}},
  series       = {{JMLR} Workshop and Conference Proceedings},
  volume       = {30},
  pages        = {819--850},
  publisher    = {JMLR.org},
  year         = {2013},
  url          = {http://proceedings.mlr.press/v30/Guha13.html},
  timestamp    = {Wed, 29 May 2019 08:41:46 +0200},
  biburl       = {https://dblp.org/rec/conf/colt/ThakurtaS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LewkoOS13,
  author       = {Mark Lewko and
                  Adam O'Neill and
                  Adam D. Smith},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Regularity of Lossy {RSA} on Subdomains and Its Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {55--75},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_4},
  doi          = {10.1007/978-3-642-38348-9\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LewkoOS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/BassilyGKS13,
  author       = {Raef Bassily and
                  Adam Groce and
                  Jonathan Katz and
                  Adam D. Smith},
  title        = {Coupled-Worlds Privacy: Exploiting Adversarial Uncertainty in Statistical
                  Data Privacy},
  booktitle    = {54th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2013, 26-29 October, 2013, Berkeley, CA, {USA}},
  pages        = {439--448},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/FOCS.2013.54},
  doi          = {10.1109/FOCS.2013.54},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/BassilyGKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/ThakurtaS13,
  author       = {Abhradeep Guha Thakurta and
                  Adam D. Smith},
  editor       = {Christopher J. C. Burges and
                  L{\'{e}}on Bottou and
                  Zoubin Ghahramani and
                  Kilian Q. Weinberger},
  title        = {(Nearly) Optimal Algorithms for Private Online Learning in Full-information
                  and Bandit Settings},
  booktitle    = {Advances in Neural Information Processing Systems 26: 27th Annual
                  Conference on Neural Information Processing Systems 2013. Proceedings
                  of a meeting held December 5-8, 2013, Lake Tahoe, Nevada, United States},
  pages        = {2733--2741},
  year         = {2013},
  url          = {https://proceedings.neurips.cc/paper/2013/hash/c850371fda6892fbfd1c5a5b457e5777-Abstract.html},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/ThakurtaS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/KasiviswanathanRS13,
  author       = {Shiva Prasad Kasiviswanathan and
                  Mark Rudelson and
                  Adam D. Smith},
  editor       = {Sanjeev Khanna},
  title        = {The Power of Linear Reconstruction Attacks},
  booktitle    = {Proceedings of the Twenty-Fourth Annual {ACM-SIAM} Symposium on Discrete
                  Algorithms, {SODA} 2013, New Orleans, Louisiana, USA, January 6-8,
                  2013},
  pages        = {1415--1433},
  publisher    = {{SIAM}},
  year         = {2013},
  url          = {https://doi.org/10.1137/1.9781611973105.102},
  doi          = {10.1137/1.9781611973105.102},
  timestamp    = {Tue, 02 Feb 2021 17:07:29 +0100},
  biburl       = {https://dblp.org/rec/conf/soda/KasiviswanathanRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KasiviswanathanNRS13,
  author       = {Shiva Prasad Kasiviswanathan and
                  Kobbi Nissim and
                  Sofya Raskhodnikova and
                  Adam D. Smith},
  editor       = {Amit Sahai},
  title        = {Analyzing Graphs with Node Differential Privacy},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  pages        = {457--476},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_26},
  doi          = {10.1007/978-3-642-36594-2\_26},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KasiviswanathanNRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SmithZ13,
  author       = {Adam D. Smith and
                  Ye Zhang},
  title        = {Near-linear time, Leakage-resilient Key Evolution Schemes from Expander
                  Graphs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {864},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/864},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SmithZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/SlavkovicS12,
  author       = {Aleksandra B. Slavkovic and
                  Adam D. Smith},
  title        = {Special Issue on Statistical and Learning-Theoretic Challenges in
                  Data Privacy},
  journal      = {J. Priv. Confidentiality},
  volume       = {4},
  number       = {1},
  year         = {2012},
  url          = {https://doi.org/10.29012/jpc.v4i1.609},
  doi          = {10.29012/JPC.V4I1.609},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/SlavkovicS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/DodisKKRS12,
  author       = {Yevgeniy Dodis and
                  Bhavana Kanukurthi and
                  Jonathan Katz and
                  Leonid Reyzin and
                  Adam D. Smith},
  title        = {Robust Fuzzy Extractors and Authenticated Key Agreement From Close
                  Secrets},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {9},
  pages        = {6207--6222},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2012.2200290},
  doi          = {10.1109/TIT.2012.2200290},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/DodisKKRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/jmlr/KiferST12,
  author       = {Daniel Kifer and
                  Adam D. Smith and
                  Abhradeep Thakurta},
  editor       = {Shie Mannor and
                  Nathan Srebro and
                  Robert C. Williamson},
  title        = {Private Convex Optimization for Empirical Risk Minimization with Applications
                  to High-dimensional Regression},
  booktitle    = {{COLT} 2012 - The 25th Annual Conference on Learning Theory, June
                  25-27, 2012, Edinburgh, Scotland},
  series       = {{JMLR} Proceedings},
  volume       = {23},
  pages        = {25.1--25.40},
  publisher    = {JMLR.org},
  year         = {2012},
  url          = {http://proceedings.mlr.press/v23/kifer12/kifer12.pdf},
  timestamp    = {Wed, 29 May 2019 08:41:46 +0200},
  biburl       = {https://dblp.org/rec/journals/jmlr/KiferST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icits/2012,
  editor       = {Adam D. Smith},
  title        = {Information Theoretic Security - 6th International Conference, {ICITS}
                  2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7412},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32284-6},
  doi          = {10.1007/978-3-642-32284-6},
  isbn         = {978-3-642-32283-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1210-2381,
  author       = {Shiva Prasad Kasiviswanathan and
                  Mark Rudelson and
                  Adam D. Smith},
  title        = {The Power of Linear Reconstruction Attacks},
  journal      = {CoRR},
  volume       = {abs/1210.2381},
  year         = {2012},
  url          = {http://arxiv.org/abs/1210.2381},
  eprinttype    = {arXiv},
  eprint       = {1210.2381},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1210-2381.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/KarwaRSY11,
  author       = {Vishesh Karwa and
                  Sofya Raskhodnikova and
                  Adam D. Smith and
                  Grigory Yaroslavtsev},
  title        = {Private Analysis of Graph Structure},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {4},
  number       = {11},
  pages        = {1146--1157},
  year         = {2011},
  url          = {http://www.vldb.org/pvldb/vol4/p1146-karwa.pdf},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/KarwaRSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/KasiviswanathanLNRS11,
  author       = {Shiva Prasad Kasiviswanathan and
                  Homin K. Lee and
                  Kobbi Nissim and
                  Sofya Raskhodnikova and
                  Adam D. Smith},
  title        = {What Can We Learn Privately?},
  journal      = {{SIAM} J. Comput.},
  volume       = {40},
  number       = {3},
  pages        = {793--826},
  year         = {2011},
  url          = {https://doi.org/10.1137/090756090},
  doi          = {10.1137/090756090},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/KasiviswanathanLNRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/TomamichelSSR11,
  author       = {Marco Tomamichel and
                  Christian Schaffner and
                  Adam D. Smith and
                  Renato Renner},
  title        = {Leftover Hashing Against Quantum Side Information},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {57},
  number       = {8},
  pages        = {5524--5535},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIT.2011.2158473},
  doi          = {10.1109/TIT.2011.2158473},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/TomamichelSSR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HallgrenSS11,
  author       = {Sean Hallgren and
                  Adam D. Smith and
                  Fang Song},
  editor       = {Phillip Rogaway},
  title        = {Classical Cryptographic Protocols in a Quantum World},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {411--428},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_23},
  doi          = {10.1007/978-3-642-22792-9\_23},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HallgrenSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/Smith11,
  author       = {Adam D. Smith},
  editor       = {Lance Fortnow and
                  Salil P. Vadhan},
  title        = {Privacy-preserving statistical estimation with optimal convergence
                  rates},
  booktitle    = {Proceedings of the 43rd {ACM} Symposium on Theory of Computing, {STOC}
                  2011, San Jose, CA, USA, 6-8 June 2011},
  pages        = {813--822},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1993636.1993743},
  doi          = {10.1145/1993636.1993743},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/Smith11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzOS11,
  author       = {Eike Kiltz and
                  Adam O'Neill and
                  Adam D. Smith},
  title        = {Instantiability of {RSA-OAEP} under Chosen-Plaintext Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {559},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/559},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiltzOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KatzSS10,
  author       = {Jonathan Katz and
                  Ji Sun Shin and
                  Adam D. Smith},
  title        = {Parallel and Concurrent Security of the {HB} and HB\({}^{\mbox{+}}\)
                  Protocols},
  journal      = {J. Cryptol.},
  volume       = {23},
  number       = {3},
  pages        = {402--421},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00145-010-9061-2},
  doi          = {10.1007/S00145-010-9061-2},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KatzSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/DworkS10,
  author       = {Cynthia Dwork and
                  Adam D. Smith},
  title        = {Differential Privacy for Statistics: What we Know and What we Want
                  to Learn},
  journal      = {J. Priv. Confidentiality},
  volume       = {1},
  number       = {2},
  year         = {2010},
  url          = {https://doi.org/10.29012/jpc.v1i2.570},
  doi          = {10.29012/JPC.V1I2.570},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/DworkS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KiltzOS10,
  author       = {Eike Kiltz and
                  Adam O'Neill and
                  Adam D. Smith},
  editor       = {Tal Rabin},
  title        = {Instantiability of {RSA-OAEP} under Chosen-Plaintext Attack},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {295--313},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_16},
  doi          = {10.1007/978-3-642-14623-7\_16},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KiltzOS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GuruswamiS10,
  author       = {Venkatesan Guruswami and
                  Adam D. Smith},
  title        = {Codes for Computationally Simple Channels: Explicit Constructions
                  with Optimal Rate},
  booktitle    = {51th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2010, October 23-26, 2010, Las Vegas, Nevada, {USA}},
  pages        = {723--732},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/FOCS.2010.74},
  doi          = {10.1109/FOCS.2010.74},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GuruswamiS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/TomamichelRSS10,
  author       = {Marco Tomamichel and
                  Renato Renner and
                  Christian Schaffner and
                  Adam D. Smith},
  title        = {Leftover Hashing against quantum side information},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2010,
                  June 13-18, 2010, Austin, Texas, USA, Proceedings},
  pages        = {2703--2707},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISIT.2010.5513652},
  doi          = {10.1109/ISIT.2010.5513652},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/TomamichelRSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/BhaskarLST10,
  author       = {Raghav Bhaskar and
                  Srivatsan Laxman and
                  Adam D. Smith and
                  Abhradeep Thakurta},
  editor       = {Bharat Rao and
                  Balaji Krishnapuram and
                  Andrew Tomkins and
                  Qiang Yang},
  title        = {Discovering frequent patterns in sensitive data},
  booktitle    = {Proceedings of the 16th {ACM} {SIGKDD} International Conference on
                  Knowledge Discovery and Data Mining, Washington, DC, USA, July 25-28,
                  2010},
  pages        = {503--512},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1835804.1835869},
  doi          = {10.1145/1835804.1835869},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kdd/BhaskarLST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/KasiviswanathanRSU10,
  author       = {Shiva Prasad Kasiviswanathan and
                  Mark Rudelson and
                  Adam D. Smith and
                  Jonathan R. Ullman},
  editor       = {Leonard J. Schulman},
  title        = {The price of privately releasing contingency tables and the spectra
                  of random matrices with correlated rows},
  booktitle    = {Proceedings of the 42nd {ACM} Symposium on Theory of Computing, {STOC}
                  2010, Cambridge, Massachusetts, USA, 5-8 June 2010},
  pages        = {775--784},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1806689.1806795},
  doi          = {10.1145/1806689.1806795},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/KasiviswanathanRSU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1004-4017,
  author       = {Venkatesan Guruswami and
                  Adam D. Smith},
  title        = {Codes for Computationally Simple Channels: Explicit Constructions
                  with Optimal Rate},
  journal      = {CoRR},
  volume       = {abs/1004.4017},
  year         = {2010},
  url          = {http://arxiv.org/abs/1004.4017},
  eprinttype    = {arXiv},
  eprint       = {1004.4017},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1004-4017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GuruswamiS10,
  author       = {Venkatesan Guruswami and
                  Adam D. Smith},
  title        = {Codes for Computationally Simple Channels: Explicit Constructions
                  with Optimal Rate},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR10-077}},
  year         = {2010},
  url          = {https://eccc.weizmann.ac.il/report/2010/077},
  eprinttype    = {ECCC},
  eprint       = {TR10-077},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/GuruswamiS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisKKRS10,
  author       = {Yevgeniy Dodis and
                  Bhavana Kanukurthi and
                  Jonathan Katz and
                  Leonid Reyzin and
                  Adam D. Smith},
  title        = {Robust Fuzzy Extractors and Authenticated Key Agreement from Close
                  Secrets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {456},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/456},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisKKRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/RaskhodnikovaRSS09,
  author       = {Sofya Raskhodnikova and
                  Dana Ron and
                  Amir Shpilka and
                  Adam D. Smith},
  title        = {Strong Lower Bounds for Approximating Distribution Support Size and
                  the Distinct Elements Problem},
  journal      = {{SIAM} J. Comput.},
  volume       = {39},
  number       = {3},
  pages        = {813--842},
  year         = {2009},
  url          = {https://doi.org/10.1137/070701649},
  doi          = {10.1137/070701649},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/RaskhodnikovaRSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/Smith09,
  author       = {Adam D. Smith},
  editor       = {Juan A. Garay and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {Asymptotically Optimal and Private Statistical Estimation},
  booktitle    = {Cryptology and Network Security, 8th International Conference, {CANS}
                  2009, Kanazawa, Japan, December 12-14, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5888},
  pages        = {53--57},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10433-6\_4},
  doi          = {10.1007/978-3-642-10433-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/Smith09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Smith09,
  author       = {Adam D. Smith},
  editor       = {Kaoru Kurosawa},
  title        = {What Can Cryptography Do for Coding Theory?},
  booktitle    = {Information Theoretic Security, 4th International Conference, {ICITS}
                  2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5973},
  pages        = {158},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14496-7\_13},
  doi          = {10.1007/978-3-642-14496-7\_13},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Smith09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisKSW09,
  author       = {Yevgeniy Dodis and
                  Jonathan Katz and
                  Adam D. Smith and
                  Shabsi Walfish},
  editor       = {Omer Reingold},
  title        = {Composability and On-Line Deniability of Authentication},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {146--162},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_10},
  doi          = {10.1007/978-3-642-00457-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisKSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/DodisORS08,
  author       = {Yevgeniy Dodis and
                  Rafail Ostrovsky and
                  Leonid Reyzin and
                  Adam D. Smith},
  title        = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and
                  Other Noisy Data},
  journal      = {{SIAM} J. Comput.},
  volume       = {38},
  number       = {1},
  pages        = {97--139},
  year         = {2008},
  url          = {https://doi.org/10.1137/060651380},
  doi          = {10.1137/060651380},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/DodisORS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/NaorSS08,
  author       = {Moni Naor and
                  Gil Segev and
                  Adam D. Smith},
  title        = {Tight Bounds for Unconditional Authentication Protocols in the Manual
                  Channel and Shared Key Models},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {54},
  number       = {6},
  pages        = {2408--2425},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIT.2008.921691},
  doi          = {10.1109/TIT.2008.921691},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/NaorSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/EnckBRMS08,
  author       = {William Enck and
                  Kevin R. B. Butler and
                  Thomas Richardson and
                  Patrick D. McDaniel and
                  Adam D. Smith},
  title        = {Defending Against Attacks on Main Memory Persistence},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {65--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.45},
  doi          = {10.1109/ACSAC.2008.45},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/EnckBRMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DamgardIKNS08,
  author       = {Ivan Damg{\aa}rd and
                  Yuval Ishai and
                  Mikkel Kr{\o}igaard and
                  Jesper Buus Nielsen and
                  Adam D. Smith},
  editor       = {David A. Wagner},
  title        = {Scalable Multiparty Computation with Nearly Optimal Work and Resilience},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5157},
  pages        = {241--261},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85174-5\_14},
  doi          = {10.1007/978-3-540-85174-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DamgardIKNS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GoyalMS08,
  author       = {Vipul Goyal and
                  Payman Mohassel and
                  Adam D. Smith},
  editor       = {Nigel P. Smart},
  title        = {Efficient Two Party and Multi Party Computation Against Covert Adversaries},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {289--306},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_17},
  doi          = {10.1007/978-3-540-78967-3\_17},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GoyalMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/KasiviswanathanLNRS08,
  author       = {Shiva Prasad Kasiviswanathan and
                  Homin K. Lee and
                  Kobbi Nissim and
                  Sofya Raskhodnikova and
                  Adam D. Smith},
  title        = {What Can We Learn Privately?},
  booktitle    = {49th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2008, October 25-28, 2008, Philadelphia, PA, {USA}},
  pages        = {531--540},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/FOCS.2008.27},
  doi          = {10.1109/FOCS.2008.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/KasiviswanathanLNRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/GantaKS08,
  author       = {Srivatsava Ranjit Ganta and
                  Shiva Prasad Kasiviswanathan and
                  Adam D. Smith},
  editor       = {Ying Li and
                  Bing Liu and
                  Sunita Sarawagi},
  title        = {Composition attacks and auxiliary information in data privacy},
  booktitle    = {Proceedings of the 14th {ACM} {SIGKDD} International Conference on
                  Knowledge Discovery and Data Mining, Las Vegas, Nevada, USA, August
                  24-27, 2008},
  pages        = {265--273},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1401890.1401926},
  doi          = {10.1145/1401890.1401926},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kdd/GantaKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0803-0032,
  author       = {Srivatsava Ranjit Ganta and
                  Shiva Prasad Kasiviswanathan and
                  Adam D. Smith},
  title        = {Composition Attacks and Auxiliary Information in Data Privacy},
  journal      = {CoRR},
  volume       = {abs/0803.0032},
  year         = {2008},
  url          = {http://arxiv.org/abs/0803.0032},
  eprinttype    = {arXiv},
  eprint       = {0803.0032},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0803-0032.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0803-0924,
  author       = {Shiva Prasad Kasiviswanathan and
                  Homin K. Lee and
                  Kobbi Nissim and
                  Sofya Raskhodnikova and
                  Adam D. Smith},
  title        = {What Can We Learn Privately?},
  journal      = {CoRR},
  volume       = {abs/0803.0924},
  year         = {2008},
  url          = {http://arxiv.org/abs/0803.0924},
  eprinttype    = {arXiv},
  eprint       = {0803.0924},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0803-0924.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0803-3946,
  author       = {Shiva Prasad Kasiviswanathan and
                  Adam D. Smith},
  title        = {A Note on Differential Privacy: Defining Resistance to Arbitrary Side
                  Information},
  journal      = {CoRR},
  volume       = {abs/0803.3946},
  year         = {2008},
  url          = {http://arxiv.org/abs/0803.3946},
  eprinttype    = {arXiv},
  eprint       = {0803.3946},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0803-3946.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0809-4794,
  author       = {Adam D. Smith},
  title        = {Efficient, Differentially Private Point Estimators},
  journal      = {CoRR},
  volume       = {abs/0809.4794},
  year         = {2008},
  url          = {http://arxiv.org/abs/0809.4794},
  eprinttype    = {arXiv},
  eprint       = {0809.4794},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0809-4794.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/approx/RaskhodnikovaRRS07,
  author       = {Sofya Raskhodnikova and
                  Dana Ron and
                  Ronitt Rubinfeld and
                  Adam D. Smith},
  editor       = {Moses Charikar and
                  Klaus Jansen and
                  Omer Reingold and
                  Jos{\'{e}} D. P. Rolim},
  title        = {Sublinear Algorithms for Approximating String Compressibility},
  booktitle    = {Approximation, Randomization, and Combinatorial Optimization. Algorithms
                  and Techniques, 10th International Workshop, {APPROX} 2007, and 11th
                  International Workshop, {RANDOM} 2007, Princeton, NJ, USA, August
                  20-22, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4627},
  pages        = {609--623},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74208-1\_44},
  doi          = {10.1007/978-3-540-74208-1\_44},
  timestamp    = {Sat, 30 Sep 2023 09:34:32 +0200},
  biburl       = {https://dblp.org/rec/conf/approx/RaskhodnikovaRRS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/RaskhodnikovaRSS07,
  author       = {Sofya Raskhodnikova and
                  Dana Ron and
                  Amir Shpilka and
                  Adam D. Smith},
  title        = {Strong Lower Bounds for Approximating Distribution Support Size and
                  the Distinct Elements Problem},
  booktitle    = {48th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS}
                  2007), October 20-23, 2007, Providence, RI, USA, Proceedings},
  pages        = {559--569},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/FOCS.2007.67},
  doi          = {10.1109/FOCS.2007.67},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/RaskhodnikovaRSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/Smith07,
  author       = {Adam D. Smith},
  editor       = {Nikhil Bansal and
                  Kirk Pruhs and
                  Clifford Stein},
  title        = {Scrambling adversarial errors using few random bits, optimal information
                  reconciliation, and better private codes},
  booktitle    = {Proceedings of the Eighteenth Annual {ACM-SIAM} Symposium on Discrete
                  Algorithms, {SODA} 2007, New Orleans, Louisiana, USA, January 7-9,
                  2007},
  pages        = {395--404},
  publisher    = {{SIAM}},
  year         = {2007},
  url          = {http://dl.acm.org/citation.cfm?id=1283383.1283425},
  timestamp    = {Tue, 15 Feb 2022 07:54:27 +0100},
  biburl       = {https://dblp.org/rec/conf/soda/Smith07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/NissimRS07,
  author       = {Kobbi Nissim and
                  Sofya Raskhodnikova and
                  Adam D. Smith},
  editor       = {David S. Johnson and
                  Uriel Feige},
  title        = {Smooth sensitivity and sampling in private data analysis},
  booktitle    = {Proceedings of the 39th Annual {ACM} Symposium on Theory of Computing,
                  San Diego, California, USA, June 11-13, 2007},
  pages        = {75--84},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1250790.1250803},
  doi          = {10.1145/1250790.1250803},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/NissimRS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0706-1084,
  author       = {Sofya Raskhodnikova and
                  Dana Ron and
                  Ronitt Rubinfeld and
                  Adam D. Smith},
  title        = {Sublinear Algorithms for Approximating String Compressibility},
  journal      = {CoRR},
  volume       = {abs/0706.1084},
  year         = {2007},
  url          = {http://arxiv.org/abs/0706.1084},
  eprinttype    = {arXiv},
  eprint       = {0706.1084},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0706-1084.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/NaorSS06,
  author       = {Moni Naor and
                  Gil Segev and
                  Adam D. Smith},
  editor       = {Cynthia Dwork},
  title        = {Tight Bounds for Unconditional Authentication Protocols in the Manual
                  Channel and Shared Key Models},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {214--231},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_13},
  doi          = {10.1007/11818175\_13},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/NaorSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisKRS06,
  author       = {Yevgeniy Dodis and
                  Jonathan Katz and
                  Leonid Reyzin and
                  Adam D. Smith},
  editor       = {Cynthia Dwork},
  title        = {Robust Fuzzy Extractors and Authenticated Key Agreement from Close
                  Secrets},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {232--250},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_14},
  doi          = {10.1007/11818175\_14},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisKRS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/Ben-OrCGHS06,
  author       = {Michael Ben{-}Or and
                  Claude Cr{\'{e}}peau and
                  Daniel Gottesman and
                  Avinatan Hassidim and
                  Adam D. Smith},
  title        = {Secure Multiparty Quantum Computation with (Only) a Strict Honest
                  Majority},
  booktitle    = {47th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS}
                  2006), 21-24 October 2006, Berkeley, California, USA, Proceedings},
  pages        = {249--260},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/FOCS.2006.68},
  doi          = {10.1109/FOCS.2006.68},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/Ben-OrCGHS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DworkMNS06,
  author       = {Cynthia Dwork and
                  Frank McSherry and
                  Kobbi Nissim and
                  Adam D. Smith},
  editor       = {Shai Halevi and
                  Tal Rabin},
  title        = {Calibrating Noise to Sensitivity in Private Data Analysis},
  booktitle    = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
                  2006, New York, NY, USA, March 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3876},
  pages        = {265--284},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11681878\_14},
  doi          = {10.1007/11681878\_14},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DworkMNS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0602007,
  author       = {Yevgeniy Dodis and
                  Rafail Ostrovsky and
                  Leonid Reyzin and
                  Adam D. Smith},
  title        = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and
                  Other Noisy Data},
  journal      = {CoRR},
  volume       = {abs/cs/0602007},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0602007},
  eprinttype    = {arXiv},
  eprint       = {cs/0602007},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0602007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/RaskhodnikovaS06,
  author       = {Sofya Raskhodnikova and
                  Adam D. Smith},
  title        = {A Note on Adaptivity in Testing Properties of Bounded Degree Graphs},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR06-089}},
  year         = {2006},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2006/TR06-089/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR06-089},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/RaskhodnikovaS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Smith06,
  author       = {Adam D. Smith},
  title        = {Scrambling Adversarial Errors Using Few Random Bits, Optimal Information
                  Reconciliation, and Better Private Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {20},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/020},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Smith06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorSS06,
  author       = {Moni Naor and
                  Gil Segev and
                  Adam D. Smith},
  title        = {Tight Bounds for Unconditional Authentication Protocols in the Manual
                  Channel and Shared Key Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzS06,
  author       = {Jonathan Katz and
                  Adam D. Smith},
  title        = {Analyzing the {HB} and {HB+} Protocols in the "Large Error"
                  Case},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {326},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/326},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BoyenDKOS05,
  author       = {Xavier Boyen and
                  Yevgeniy Dodis and
                  Jonathan Katz and
                  Rafail Ostrovsky and
                  Adam D. Smith},
  editor       = {Ronald Cramer},
  title        = {Secure Remote Authentication Using Biometric Data},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {147--163},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_9},
  doi          = {10.1007/11426639\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BoyenDKOS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CrepeauGS05,
  author       = {Claude Cr{\'{e}}peau and
                  Daniel Gottesman and
                  Adam D. Smith},
  editor       = {Ronald Cramer},
  title        = {Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {285--301},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_17},
  doi          = {10.1007/11426639\_17},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CrepeauGS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/DodisS05,
  author       = {Yevgeniy Dodis and
                  Adam D. Smith},
  editor       = {Harold N. Gabow and
                  Ronald Fagin},
  title        = {Correcting errors without leaking partial information},
  booktitle    = {Proceedings of the 37th Annual {ACM} Symposium on Theory of Computing,
                  Baltimore, MD, USA, May 22-24, 2005},
  pages        = {654--663},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1060590.1060688},
  doi          = {10.1145/1060590.1060688},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/DodisS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ChawlaDMSW05,
  author       = {Shuchi Chawla and
                  Cynthia Dwork and
                  Frank McSherry and
                  Adam D. Smith and
                  Hoeteck Wee},
  editor       = {Joe Kilian},
  title        = {Toward Privacy in Public Databases},
  booktitle    = {Theory of Cryptography, Second Theory of Cryptography Conference,
                  {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3378},
  pages        = {363--385},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30576-7\_20},
  doi          = {10.1007/978-3-540-30576-7\_20},
  timestamp    = {Sun, 02 Jun 2019 21:21:22 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/ChawlaDMSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisS05,
  author       = {Yevgeniy Dodis and
                  Adam D. Smith},
  editor       = {Joe Kilian},
  title        = {Entropic Security and the Encryption of High Entropy Messages},
  booktitle    = {Theory of Cryptography, Second Theory of Cryptography Conference,
                  {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3378},
  pages        = {556--577},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30576-7\_30},
  doi          = {10.1007/978-3-540-30576-7\_30},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-quant-ph-0503139,
  author       = {Claude Cr{\'{e}}peau and
                  Daniel Gottesman and
                  Adam D. Smith},
  title        = {Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes},
  journal      = {CoRR},
  volume       = {abs/quant-ph/0503139},
  year         = {2005},
  url          = {http://arxiv.org/abs/quant-ph/0503139},
  eprinttype    = {arXiv},
  eprint       = {quant-ph/0503139},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-quant-ph-0503139.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR05-125,
  author       = {Sofya Raskhodnikova and
                  Dana Ron and
                  Ronitt Rubinfeld and
                  Amir Shpilka and
                  Adam D. Smith},
  title        = {Sublinear Algorithms for Approximating String Compressibility and
                  the Distribution Support Size},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR05-125}},
  year         = {2005},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2005/TR05-125/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR05-125},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR05-125.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ndltd/Smith04,
  author       = {Adam D. Smith},
  title        = {Maintaining secrecy when information leakage is unavoidable},
  school       = {Massachusetts Institute of Technology, Cambridge, MA, {USA}},
  year         = {2004},
  url          = {https://hdl.handle.net/1721.1/28744},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ndltd/Smith04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/approx/AmbainisS04,
  author       = {Andris Ambainis and
                  Adam D. Smith},
  editor       = {Klaus Jansen and
                  Sanjeev Khanna and
                  Jos{\'{e}} D. P. Rolim and
                  Dana Ron},
  title        = {Small Pseudo-random Families of Matrices: Derandomizing Approximate
                  Quantum Encryption},
  booktitle    = {Approximation, Randomization, and Combinatorial Optimization, Algorithms
                  and Techniques, 7th International Workshop on Approximation Algorithms
                  for Combinatorial Optimization Problems, {APPROX} 2004, and 8th International
                  Workshop on Randomization and Computation, {RANDOM} 2004, Cambridge,
                  MA, USA, August 22-24, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3122},
  pages        = {249--260},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27821-4\_23},
  doi          = {10.1007/978-3-540-27821-4\_23},
  timestamp    = {Tue, 21 Sep 2021 09:36:24 +0200},
  biburl       = {https://dblp.org/rec/conf/approx/AmbainisS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisRS04,
  author       = {Yevgeniy Dodis and
                  Leonid Reyzin and
                  Adam D. Smith},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and
                  Other Noisy Data},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {523--540},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_31},
  doi          = {10.1007/978-3-540-24676-3\_31},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisRS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/OstrovskyRS04,
  author       = {Rafail Ostrovsky and
                  Charles Rackoff and
                  Adam D. Smith},
  editor       = {Josep D{\'{\i}}az and
                  Juhani Karhum{\"{a}}ki and
                  Arto Lepist{\"{o}} and
                  Donald Sannella},
  title        = {Efficient Consistency Proofs for Generalized Queries on a Committed
                  Database},
  booktitle    = {Automata, Languages and Programming: 31st International Colloquium,
                  {ICALP} 2004, Turku, Finland, July 12-16, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3142},
  pages        = {1041--1053},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27836-8\_87},
  doi          = {10.1007/978-3-540-27836-8\_87},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/OstrovskyRS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DworkSST04,
  author       = {Cynthia Dwork and
                  Ronen Shaltiel and
                  Adam D. Smith and
                  Luca Trevisan},
  editor       = {Moni Naor},
  title        = {List-Decoding of Linear Functions and Analysis of a Two-Round Zero-Knowledge
                  Argument},
  booktitle    = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
                  2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2951},
  pages        = {101--120},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24638-1\_6},
  doi          = {10.1007/978-3-540-24638-1\_6},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DworkSST04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OstrovskyRS04,
  author       = {Rafail Ostrovsky and
                  Charles Rackoff and
                  Adam D. Smith},
  title        = {Efficient Consistency Proofs for Generalized Queries on a Committed
                  Database},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {170},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/170},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OstrovskyRS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisS04,
  author       = {Yevgeniy Dodis and
                  Adam D. Smith},
  title        = {Entropic Security and the Encryption of High Entropy Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {219},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KatzOS03,
  author       = {Jonathan Katz and
                  Rafail Ostrovsky and
                  Adam D. Smith},
  editor       = {Eli Biham},
  title        = {Round Efficiency of Multi-party Computation with a Dishonest Majority},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Warsaw,
                  Poland, May 4-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2656},
  pages        = {578--595},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-39200-9\_36},
  doi          = {10.1007/3-540-39200-9\_36},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KatzOS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/PeikertSS03,
  author       = {Chris Peikert and
                  Abhi Shelat and
                  Adam D. Smith},
  title        = {Lower bounds for collusion-secure fingerprinting},
  booktitle    = {Proceedings of the Fourteenth Annual {ACM-SIAM} Symposium on Discrete
                  Algorithms, January 12-14, 2003, Baltimore, Maryland, {USA}},
  pages        = {472--479},
  publisher    = {{ACM/SIAM}},
  year         = {2003},
  url          = {http://dl.acm.org/citation.cfm?id=644108.644187},
  timestamp    = {Fri, 08 Apr 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/PeikertSS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisORS03,
  author       = {Yevgeniy Dodis and
                  Rafail Ostrovsky and
                  Leonid Reyzin and
                  Adam D. Smith},
  title        = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and
                  Other Noisy Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {235},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/235},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisORS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coco/AmbainisSY02,
  author       = {Andris Ambainis and
                  Adam D. Smith and
                  Ke Yang},
  title        = {Extracting Quantum Entanglement},
  booktitle    = {Proceedings of the 17th Annual {IEEE} Conference on Computational
                  Complexity, Montr{\'{e}}al, Qu{\'{e}}bec, Canada, May 21-24,
                  2002},
  pages        = {103--112},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CCC.2002.1004345},
  doi          = {10.1109/CCC.2002.1004345},
  timestamp    = {Fri, 05 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coco/AmbainisSY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/BarnumCGST02,
  author       = {Howard Barnum and
                  Claude Cr{\'{e}}peau and
                  Daniel Gottesman and
                  Adam D. Smith and
                  Alain Tapp},
  title        = {Authentication of Quantum Messages},
  booktitle    = {43rd Symposium on Foundations of Computer Science {(FOCS} 2002), 16-19
                  November 2002, Vancouver, BC, Canada, Proceedings},
  pages        = {449--458},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/SFCS.2002.1181969},
  doi          = {10.1109/SFCS.2002.1181969},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/BarnumCGST02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/FitziGHHS02,
  author       = {Matthias Fitzi and
                  Daniel Gottesman and
                  Martin Hirt and
                  Thomas Holenstein and
                  Adam D. Smith},
  editor       = {Aleta Ricciardi},
  title        = {Detectable byzantine agreement secure against faulty majorities},
  booktitle    = {Proceedings of the Twenty-First Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} 2002, Monterey, California, USA,
                  July 21-24, 2002},
  pages        = {118--126},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/571825.571841},
  doi          = {10.1145/571825.571841},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/FitziGHHS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/CrepeauGS02,
  author       = {Claude Cr{\'{e}}peau and
                  Daniel Gottesman and
                  Adam D. Smith},
  editor       = {John H. Reif},
  title        = {Secure multi-party quantum computation},
  booktitle    = {Proceedings on 34th Annual {ACM} Symposium on Theory of Computing,
                  May 19-21, 2002, Montr{\'{e}}al, Qu{\'{e}}bec, Canada},
  pages        = {643--652},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/509907.510000},
  doi          = {10.1145/509907.510000},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/CrepeauGS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/quant-ph-0205128,
  author       = {Howard Barnum and
                  Claude Cr{\'{e}}peau and
                  Daniel Gottesman and
                  Adam D. Smith and
                  Alain Tapp},
  title        = {Authentication of Quantum Messages},
  journal      = {CoRR},
  volume       = {quant-ph/0205128},
  year         = {2002},
  url          = {http://arxiv.org/abs/quant-ph/0205128},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/quant-ph-0205128.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarnumCGST02,
  author       = {Howard Barnum and
                  Claude Cr{\'{e}}peau and
                  Daniel Gottesman and
                  Adam D. Smith and
                  Alain Tapp},
  title        = {Authentication of Quantum Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {82},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarnumCGST02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LiskovLMRS01,
  author       = {Moses D. Liskov and
                  Anna Lysyanskaya and
                  Silvio Micali and
                  Leonid Reyzin and
                  Adam D. Smith},
  editor       = {Colin Boyd},
  title        = {Mutually Independent Commitments},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Gold Coast, Australia, December 9-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2248},
  pages        = {385--401},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45682-1\_23},
  doi          = {10.1007/3-540-45682-1\_23},
  timestamp    = {Tue, 01 Jun 2021 15:22:33 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LiskovLMRS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CrescenzoKOS01,
  author       = {Giovanni Di Crescenzo and
                  Jonathan Katz and
                  Rafail Ostrovsky and
                  Adam D. Smith},
  editor       = {Birgit Pfitzmann},
  title        = {Efficient and Non-interactive Non-malleable Commitment},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {40--59},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_4},
  doi          = {10.1007/3-540-44987-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CrescenzoKOS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisSS01,
  author       = {Yevgeniy Dodis and
                  Amit Sahai and
                  Adam D. Smith},
  editor       = {Birgit Pfitzmann},
  title        = {On Perfect and Adaptive Security in Exposure-Resilient Cryptography},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {301--324},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_19},
  doi          = {10.1007/3-540-44987-6\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisSS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CrescenzoKOS01,
  author       = {Giovanni Di Crescenzo and
                  Jonathan Katz and
                  Rafail Ostrovsky and
                  Adam D. Smith},
  title        = {Efficient and Non-Interactive Non-Malleable Commitment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {32},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CrescenzoKOS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CR-9902010,
  author       = {Adam D. Smith and
                  Anton Stiglic},
  title        = {Multiparty computation unconditionally secure against Q{\^{}}2 adversary
                  structures},
  journal      = {CoRR},
  volume       = {cs.CR/9902010},
  year         = {1999},
  url          = {https://arxiv.org/abs/cs/9902010},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CR-9902010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics