BibTeX records: Dana Dachman-Soled

download as .bib file

@article{DBLP:journals/corr/abs-2402-04375,
  author       = {Yvonne Zhou and
                  Mingyu Liang and
                  Ivan Brugere and
                  Dana Dachman{-}Soled and
                  Danial Dervovic and
                  Antigoni Polychroniadou and
                  Min Wu},
  title        = {Bounding the Excess Risk for Linear Models Trained on Marginal-Preserving,
                  Differentially-Private, Synthetic Data},
  journal      = {CoRR},
  volume       = {abs/2402.04375},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.04375},
  doi          = {10.48550/ARXIV.2402.04375},
  eprinttype    = {arXiv},
  eprint       = {2402.04375},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-04375.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-07724,
  author       = {Zachary McBride Lazri and
                  Danial Dervovic and
                  Antigoni Polychroniadou and
                  Ivan Brugere and
                  Dana Dachman{-}Soled and
                  Min Wu},
  title        = {Balancing Fairness and Accuracy in Data-Restricted Binary Classification},
  journal      = {CoRR},
  volume       = {abs/2403.07724},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.07724},
  doi          = {10.48550/ARXIV.2403.07724},
  eprinttype    = {arXiv},
  eprint       = {2403.07724},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-07724.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BergamaschiCDKLT24,
  author       = {Flavio Bergamaschi and
                  Anamaria Costache and
                  Dana Dachman{-}Soled and
                  Hunter Kippen and
                  Lucas LaBuff and
                  Rui Tang},
  title        = {On the Concrete Security of Approximate {FHE} with Noise-Flooding
                  Countermeasures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {424},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/424},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BergamaschiCDKLT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DachmanSoledGHK22,
  author       = {Dana Dachman{-}Soled and
                  Huijing Gong and
                  Tom Hanson and
                  Hunter Kippen},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Revisiting Security Estimation for {LWE} with Hints from a Geometric
                  Perspective},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {748--781},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_24},
  doi          = {10.1007/978-3-031-38554-4\_24},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DachmanSoledGHK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/BallGDM23,
  author       = {Marshall Ball and
                  Eli Goldin and
                  Dana Dachman{-}Soled and
                  Saachi Mutreja},
  title        = {Extracting Randomness from Samplable Distributions, Revisited},
  booktitle    = {64th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
                  2023, Santa Cruz, CA, USA, November 6-9, 2023},
  pages        = {1505--1514},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/FOCS57990.2023.00092},
  doi          = {10.1109/FOCS57990.2023.00092},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/BallGDM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-15097,
  author       = {Zachary McBride Lazri and
                  Ivan Brugere and
                  Xin Tian and
                  Dana Dachman{-}Soled and
                  Antigoni Polychroniadou and
                  Danial Dervovic and
                  Min Wu},
  title        = {A Canonical Data Transformation for Achieving Inter- and Within-group
                  Fairness},
  journal      = {CoRR},
  volume       = {abs/2310.15097},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.15097},
  doi          = {10.48550/ARXIV.2310.15097},
  eprinttype    = {arXiv},
  eprint       = {2310.15097},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-15097.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/BallD23,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled},
  title        = {(Inefficient Prover) ZAPs from Hard-to-Invert Functions},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR23-205}},
  year         = {2023},
  url          = {https://eccc.weizmann.ac.il/report/2023/205},
  eprinttype    = {ECCC},
  eprint       = {TR23-205},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eccc/BallD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/BallDGM23,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Eli Goldin and
                  Saachi Mutreja},
  title        = {Extracting Randomness from Samplable Distributions, Revisited},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR23-169}},
  year         = {2023},
  url          = {https://eccc.weizmann.ac.il/report/2023/169},
  eprinttype    = {ECCC},
  eprint       = {TR23-169},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eccc/BallDGM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiDLLY23,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Mingyu Liang and
                  Linsheng Liu and
                  Arkady Yerukhimovich},
  title        = {On the Privacy of Sublinear-Communication Jaccard Index Estimation
                  via Min-hash Sketching},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1523},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1523},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiDLLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FahrKKDLDGNPYA22,
  author       = {Michael Fahr and
                  Hunter Kippen and
                  Andrew Kwong and
                  Thinh Dang and
                  Jacob Lichtinger and
                  Dana Dachman{-}Soled and
                  Daniel Genkin and
                  Alexander Nelson and
                  Ray A. Perlner and
                  Arkady Yerukhimovich and
                  Daniel Apon},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {979--993},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560673},
  doi          = {10.1145/3548606.3560673},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FahrKKDLDGNPYA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BallDL22,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Julian Loss},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {(Nondeterministic) Hardness vs. Non-malleability},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {148--177},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_6},
  doi          = {10.1007/978-3-031-15802-5\_6},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BallDL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ChoiDGLY22,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  S. Dov Gordon and
                  Linsheng Liu and
                  Arkady Yerukhimovich},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {Secure Sampling with Sublinear Communication},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13748},
  pages        = {348--377},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22365-5\_13},
  doi          = {10.1007/978-3-031-22365-5\_13},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/ChoiDGLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/citc/2022,
  editor       = {Dana Dachman{-}Soled},
  title        = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022,
                  July 5-7, 2022, Cambridge, MA, {USA}},
  series       = {LIPIcs},
  volume       = {230},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://www.dagstuhl.de/dagpub/978-3-95977-238-9},
  isbn         = {978-3-95977-238-9},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/citc/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/BallDL22,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Julian Loss},
  title        = {(Nondeterministic) Hardness vs. Non-Malleability},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR22-010}},
  year         = {2022},
  url          = {https://eccc.weizmann.ac.il/report/2022/010},
  eprinttype    = {ECCC},
  eprint       = {TR22-010},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eccc/BallDL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallDL22,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Julian Loss},
  title        = {(Nondeterministic) Hardness vs. Non-Malleability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {70},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/070},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallDL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledCG22,
  author       = {Dana Dachman{-}Soled and
                  Seung Geol Choi and
                  S. Dov Gordon and
                  Linsheng Liu and
                  Arkady Yerukhimovich},
  title        = {Secure Sampling with Sublinear Communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {660},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/660},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FahrKKDLDGNPYA22,
  author       = {Michael Fahr and
                  Hunter Kippen and
                  Andrew Kwong and
                  Thinh Dang and
                  Jacob Lichtinger and
                  Dana Dachman{-}Soled and
                  Daniel Genkin and
                  Alexander Nelson and
                  Ray A. Perlner and
                  Arkady Yerukhimovich and
                  Daniel Apon},
  title        = {When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {952},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/952},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FahrKKDLDGNPYA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledLO22,
  author       = {Dana Dachman{-}Soled and
                  Julian Loss and
                  Adam O'Neill and
                  Nikki Sigurdson},
  title        = {Breaking {RSA} Generically is Equivalent to Factoring, with Preprocessing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1261},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1261},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledLO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledGH22,
  author       = {Dana Dachman{-}Soled and
                  Huijing Gong and
                  Tom Hanson and
                  Hunter Kippen},
  title        = {Refined Security Estimation for {LWE} with Hints via a Geometric Approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1345},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1345},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledGH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Dachman-SoledGK20,
  author       = {Dana Dachman{-}Soled and
                  Huijing Gong and
                  Mukul Kulkarni and
                  Aria Shahverdi},
  title        = {(In)Security of Ring-LWE Under Partial Key Exposure},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {72--86},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0075},
  doi          = {10.1515/JMC-2020-0075},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/Dachman-SoledGK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Dachman-SoledGK20a,
  author       = {Dana Dachman{-}Soled and
                  Huijing Gong and
                  Mukul Kulkarni and
                  Aria Shahverdi},
  title        = {Towards a Ring Analogue of the Leftover Hash Lemma},
  journal      = {J. Math. Cryptol.},
  volume       = {15},
  number       = {1},
  pages        = {87--110},
  year         = {2021},
  url          = {https://doi.org/10.1515/jmc-2020-0076},
  doi          = {10.1515/JMC-2020-0076},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/Dachman-SoledGK20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChoiDGLY21,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  S. Dov Gordon and
                  Linsheng Liu and
                  Arkady Yerukhimovich},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Compressed Oblivious Encoding for Homomorphically Encrypted Search},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {2277--2291},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484792},
  doi          = {10.1145/3460120.3484792},
  timestamp    = {Tue, 16 Nov 2021 12:59:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChoiDGLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Dachman-SoledKP21,
  author       = {Dana Dachman{-}Soled and
                  Ilan Komargodski and
                  Rafael Pass},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Non-malleable Codes for Bounded Parallel-Time Tampering},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {535--565},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_18},
  doi          = {10.1007/978-3-030-84252-9\_18},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Dachman-SoledKP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Dachman-SoledGK21,
  author       = {Dana Dachman{-}Soled and
                  Huijing Gong and
                  Hunter Kippen and
                  Aria Shahverdi},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {{BKW} Meets Fourier New Algorithms for {LPN} with Sparse Parities},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13043},
  pages        = {658--688},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90453-1\_23},
  doi          = {10.1007/978-3-030-90453-1\_23},
  timestamp    = {Mon, 08 Nov 2021 11:43:29 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/Dachman-SoledGK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ShahverdiSD21,
  author       = {Aria Shahverdi and
                  Mahammad Shirinov and
                  Dana Dachman{-}Soled},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Database Reconstruction from Noisy Volumes: {A} Cache Side-Channel
                  Attack on SQLite},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {1019--1035},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/shahverdi},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ShahverdiSD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-07708,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  S. Dov Gordon and
                  Linsheng Liu and
                  Arkady Yerukhimovich},
  title        = {Compressed Oblivious Encoding for Homomorphically Encrypted Search},
  journal      = {CoRR},
  volume       = {abs/2109.07708},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.07708},
  eprinttype    = {arXiv},
  eprint       = {2109.07708},
  timestamp    = {Wed, 22 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-07708.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledGK21,
  author       = {Dana Dachman{-}Soled and
                  Huijing Gong and
                  Hunter Kippen and
                  Aria Shahverdi},
  title        = {{BKW} Meets Fourier: New Algorithms for {LPN} with Sparse Parities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {994},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/994},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledGK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiDGLY21,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  S. Dov Gordon and
                  Linsheng Liu and
                  Arkady Yerukhimovich},
  title        = {Compressed Oblivious Encoding for Homomorphically Encrypted Search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1199},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1199},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiDGLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Dachman-SoledLS20,
  author       = {Dana Dachman{-}Soled and
                  Feng{-}Hao Liu and
                  Elaine Shi and
                  Hong{-}Sheng Zhou},
  title        = {Locally Decodable and Updatable Non-malleable Codes and Their Applications},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {1},
  pages        = {319--355},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-018-9306-z},
  doi          = {10.1007/S00145-018-9306-Z},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Dachman-SoledLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Dachman-SoledFK20,
  author       = {Dana Dachman{-}Soled and
                  Nils Fleischhacker and
                  Jonathan Katz and
                  Anna Lysyanskaya and
                  Dominique Schr{\"{o}}der},
  title        = {Feasibility and Infeasibility of Secure Computation with Malicious
                  PUFs},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {2},
  pages        = {595--617},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-019-09329-9},
  doi          = {10.1007/S00145-019-09329-9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Dachman-SoledFK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ChoiDKY20,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Arkady Yerukhimovich},
  title        = {Differentially-Private Multi-Party Sketching for Large-Scale Statistics},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2020},
  number       = {3},
  pages        = {153--174},
  year         = {2020},
  url          = {https://doi.org/10.2478/popets-2020-0047},
  doi          = {10.2478/POPETS-2020-0047},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/ChoiDKY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Dachman-SoledDG20,
  author       = {Dana Dachman{-}Soled and
                  L{\'{e}}o Ducas and
                  Huijing Gong and
                  M{\'{e}}lissa Rossi},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {{LWE} with Side Information: Attacks and Concrete Security Estimation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12171},
  pages        = {329--358},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56880-1\_12},
  doi          = {10.1007/978-3-030-56880-1\_12},
  timestamp    = {Thu, 13 Aug 2020 16:42:10 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Dachman-SoledDG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BallDK20,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {New Techniques for Zero-Knowledge: Leveraging Inefficient Provers
                  to Reduce Assumptions, Interaction, and Trust},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {674--703},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_24},
  doi          = {10.1007/978-3-030-56877-1\_24},
  timestamp    = {Mon, 28 Aug 2023 21:17:50 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BallDK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/KelseyDMT20,
  author       = {John Kelsey and
                  Dana Dachman{-}Soled and
                  Sweta Mishra and
                  Meltem S{\"{o}}nmez Turan},
  editor       = {Stanislaw Jarecki},
  title        = {{TMPS:} Ticket-Mediated Password Strengthening},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2020 - The Cryptographers' Track at
                  the {RSA} Conference 2020, San Francisco, CA, USA, February 24-28,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12006},
  pages        = {225--253},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-40186-3\_11},
  doi          = {10.1007/978-3-030-40186-3\_11},
  timestamp    = {Tue, 03 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/KelseyDMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/HongDKDD20,
  author       = {Sanghyun Hong and
                  Michael Davinroy and
                  Yigitcan Kaya and
                  Dana Dachman{-}Soled and
                  Tudor Dumitras},
  title        = {How to 0wn the {NAS} in Your Spare Time},
  booktitle    = {8th International Conference on Learning Representations, {ICLR} 2020,
                  Addis Ababa, Ethiopia, April 26-30, 2020},
  publisher    = {OpenReview.net},
  year         = {2020},
  url          = {https://openreview.net/forum?id=S1erpeBFPB},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/HongDKDD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/BallDKM20,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Tal Malkin},
  editor       = {Thomas Vidick},
  title        = {Limits to Non-Malleability},
  booktitle    = {11th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2020, January 12-14, 2020, Seattle, Washington, {USA}},
  series       = {LIPIcs},
  volume       = {151},
  pages        = {80:1--80:32},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2020.80},
  doi          = {10.4230/LIPICS.ITCS.2020.80},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/BallDKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Dachman-Soled20,
  author       = {Dana Dachman{-}Soled},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {Revisiting Fairness in {MPC:} Polynomial Number of Parties and General
                  Adversarial Structures},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12551},
  pages        = {595--620},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64378-2\_21},
  doi          = {10.1007/978-3-030-64378-2\_21},
  timestamp    = {Tue, 15 Dec 2020 12:01:12 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/Dachman-Soled20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-06776,
  author       = {Sanghyun Hong and
                  Michael Davinroy and
                  Yigitcan Kaya and
                  Dana Dachman{-}Soled and
                  Tudor Dumitras},
  title        = {How to 0wn {NAS} in Your Spare Time},
  journal      = {CoRR},
  volume       = {abs/2002.06776},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.06776},
  eprinttype    = {arXiv},
  eprint       = {2002.06776},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-06776.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-15007,
  author       = {Aria Shahverdi and
                  Mahammad Shirinov and
                  Dana Dachman{-}Soled},
  title        = {Database Reconstruction from Noisy Volumes: {A} Cache Side-Channel
                  Attack on SQLite},
  journal      = {CoRR},
  volume       = {abs/2006.15007},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.15007},
  eprinttype    = {arXiv},
  eprint       = {2006.15007},
  timestamp    = {Wed, 01 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-15007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-04484,
  author       = {Mingliang Chen and
                  Aria Shahverdi and
                  Sarah Anderson and
                  Se Yong Park and
                  Justin Zhang and
                  Dana Dachman{-}Soled and
                  Kristin E. Lauter and
                  Min Wu},
  title        = {Transparency Tools for Fairness in {AI} (Luskin)},
  journal      = {CoRR},
  volume       = {abs/2007.04484},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.04484},
  eprinttype    = {arXiv},
  eprint       = {2007.04484},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-04484.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiDKY20,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Arkady Yerukhimovich},
  title        = {Differentially-Private Multi-Party Sketching for Large-Scale Statistics},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {29},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/029},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiDKY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledDG20,
  author       = {Dana Dachman{-}Soled and
                  L{\'{e}}o Ducas and
                  Huijing Gong and
                  M{\'{e}}lissa Rossi},
  title        = {{LWE} with Side Information: Attacks and Concrete Security Estimation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {292},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/292},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledDG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledKP20,
  author       = {Dana Dachman{-}Soled and
                  Ilan Komargodski and
                  Rafael Pass},
  title        = {Non-Malleable Codes for Bounded Polynomial Depth Tampering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {776},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/776},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledKP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-Soled20,
  author       = {Dana Dachman{-}Soled},
  title        = {Revisiting Fairness in {MPC:} Polynomial Number of Parties and General
                  Adversarial Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1430},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1430},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-Soled20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/Dachman-SoledKS19,
  author       = {Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Aria Shahverdi},
  title        = {Tight upper and lower bounds for leakage-resilient, locally decodable
                  and updatable non-malleable codes},
  journal      = {Inf. Comput.},
  volume       = {268},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ic.2019.05.001},
  doi          = {10.1016/J.IC.2019.05.001},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/Dachman-SoledKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Dachman-SoledGL19,
  author       = {Dana Dachman{-}Soled and
                  S. Dov Gordon and
                  Feng{-}Hao Liu and
                  Adam O'Neill and
                  Hong{-}Sheng Zhou},
  title        = {Leakage Resilience from Program Obfuscation},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {3},
  pages        = {742--824},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9286-z},
  doi          = {10.1007/S00145-018-9286-Z},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Dachman-SoledGL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Dachman-SoledLP19,
  author       = {Dana Dachman{-}Soled and
                  Chang Liu and
                  Charalampos Papamanthou and
                  Elaine Shi and
                  Uzi Vishkin},
  title        = {Oblivious Network {RAM} and Leveraging Parallelism to Achieve Obliviousness},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {3},
  pages        = {941--972},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9301-4},
  doi          = {10.1007/S00145-018-9301-4},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Dachman-SoledLP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BallDKLM19,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Huijia Lin and
                  Tal Malkin},
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {Non-Malleable Codes Against Bounded Polynomial Time Tampering},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11476},
  pages        = {501--530},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17653-2\_17},
  doi          = {10.1007/978-3-030-17653-2\_17},
  timestamp    = {Tue, 14 May 2019 13:47:56 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BallDKLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isvlsi/0001DS19,
  author       = {Yuntao Liu and
                  Dana Dachman{-}Soled and
                  Ankur Srivastava},
  title        = {Mitigating Reverse Engineering Attacks on Deep Neural Networks},
  booktitle    = {2019 {IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2019,
                  Miami, FL, USA, July 15-17, 2019},
  pages        = {657--662},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ISVLSI.2019.00122},
  doi          = {10.1109/ISVLSI.2019.00122},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isvlsi/0001DS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Dachman-SoledK19,
  author       = {Dana Dachman{-}Soled and
                  Mukul Kulkarni},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Upper and Lower Bounds for Continuous Non-Malleable Codes},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {519--548},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_18},
  doi          = {10.1007/978-3-030-17253-4\_18},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Dachman-SoledK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/AponDGK19,
  author       = {Daniel Apon and
                  Dana Dachman{-}Soled and
                  Huijing Gong and
                  Jonathan Katz},
  editor       = {Jintai Ding and
                  Rainer Steinwandt},
  title        = {Constant-Round Group Key Exchange from the Ring-LWE Assumption},
  booktitle    = {Post-Quantum Cryptography - 10th International Conference, PQCrypto
                  2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11505},
  pages        = {189--205},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-25510-7\_11},
  doi          = {10.1007/978-3-030-25510-7\_11},
  timestamp    = {Mon, 15 Jul 2019 14:30:19 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/AponDGK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AponDGK19,
  author       = {Daniel Apon and
                  Dana Dachman{-}Soled and
                  Huijing Gong and
                  Jonathan Katz},
  title        = {Constant-Round Group Key Exchange from the Ring-LWE Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {398},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/398},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AponDGK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallDKM19,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Tal Malkin},
  title        = {Limits to Non-Malleability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {449},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/449},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallDKM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KelseyDMT19,
  author       = {John Kelsey and
                  Dana Dachman{-}Soled and
                  Sweta Mishra and
                  Meltem S{\"{o}}nmez Turan},
  title        = {{TMPS:} Ticket-Mediated Password Strengthening},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {543},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/543},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KelseyDMT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallDK19,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni},
  title        = {New Techniques for Zero-Knowledge: Leveraging Inefficient Provers
                  to Reduce Assumptions and Interaction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1464},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1464},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallDK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChoiDMW18,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Tal Malkin and
                  Hoeteck Wee},
  title        = {Improved, black-box, non-malleable encryption from semantic security},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {641--663},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0348-2},
  doi          = {10.1007/S10623-017-0348-2},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChoiDMW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/ChoiDMW18,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Tal Malkin and
                  Hoeteck Wee},
  title        = {A Black-Box Construction of Non-malleable Encryption from Semantically
                  Secure Encryption},
  journal      = {J. Cryptol.},
  volume       = {31},
  number       = {1},
  pages        = {172--201},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00145-017-9254-z},
  doi          = {10.1007/S00145-017-9254-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/ChoiDMW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BallDKM18,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Tal Malkin},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Non-malleable Codes from Average-Case Hardness: {\textdollar}{\textdollar}\{{\textbackslash}mathsf
                  \{A\}\}\{{\textbackslash}mathsf \{C\}\}{\^{}}0{\textdollar}{\textdollar}
                  , Decision Trees, and Streaming Space-Bounded Tampering},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10822},
  pages        = {618--650},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78372-7\_20},
  doi          = {10.1007/978-3-319-78372-7\_20},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BallDKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/BallDGMT18,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Siyao Guo and
                  Tal Malkin and
                  Li{-}Yang Tan},
  editor       = {Mikkel Thorup},
  title        = {Non-Malleable Codes for Small-Depth Circuits},
  booktitle    = {59th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
                  2018, Paris, France, October 7-9, 2018},
  pages        = {826--837},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/FOCS.2018.00083},
  doi          = {10.1109/FOCS.2018.00083},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/BallDGMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Dachman-SoledKS18,
  author       = {Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Aria Shahverdi},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Local Non-malleable Codes in the Bounded Retrieval Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {281--311},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_10},
  doi          = {10.1007/978-3-319-76581-5\_10},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Dachman-SoledKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-07673,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Siyao Guo and
                  Tal Malkin and
                  Li{-}Yang Tan},
  title        = {Non-Malleable Codes for Small-Depth Circuits},
  journal      = {CoRR},
  volume       = {abs/1802.07673},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.07673},
  eprinttype    = {arXiv},
  eprint       = {1802.07673},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-07673.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-03487,
  author       = {Sanghyun Hong and
                  Michael Davinroy and
                  Yigitcan Kaya and
                  Stuart Nevans Locke and
                  Ian Rackow and
                  Kevin Kulda and
                  Dana Dachman{-}Soled and
                  Tudor Dumitras},
  title        = {Security Analysis of Deep Neural Networks Operating in the Presence
                  of Cache Side-Channel Attacks},
  journal      = {CoRR},
  volume       = {abs/1810.03487},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.03487},
  eprinttype    = {arXiv},
  eprint       = {1810.03487},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-03487.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/BallDGMT18,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Siyao Guo and
                  Tal Malkin and
                  Li{-}Yang Tan},
  title        = {Non-Malleable Codes for Small-Depth Circuits},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR18-040}},
  year         = {2018},
  url          = {https://eccc.weizmann.ac.il/report/2018/040},
  eprinttype    = {ECCC},
  eprint       = {TR18-040},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eccc/BallDGMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallDGMT18,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Siyao Guo and
                  Tal Malkin and
                  Li{-}Yang Tan},
  title        = {Non-Malleable Codes for Small-Depth Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {207},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/207},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallDGMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledK18,
  author       = {Dana Dachman{-}Soled and
                  Mukul Kulkarni},
  title        = {Upper and Lower Bounds for Continuous Non-Malleable Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {517},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/517},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallDKLM18,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Huijia Lin and
                  Tal Malkin},
  title        = {Non-Malleable Codes Against Bounded Polynomial Time Tampering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1015},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1015},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallDKLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledGK18,
  author       = {Dana Dachman{-}Soled and
                  Huijing Gong and
                  Mukul Kulkarni and
                  Aria Shahverdi},
  title        = {Partial Key Exposure in Ring-LWE-Based Cryptosystems: Attacks and
                  Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1068},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledGK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Dachman-SoledKS17,
  author       = {Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Aria Shahverdi},
  editor       = {Serge Fehr},
  title        = {Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable
                  and Updatable Non-malleable Codes},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {310--332},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_13},
  doi          = {10.1007/978-3-662-54365-8\_13},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Dachman-SoledKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledKS17,
  author       = {Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Aria Shahverdi},
  title        = {Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable
                  and Updatable Non-Malleable Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledKS17a,
  author       = {Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Aria Shahverdi},
  title        = {Locally Decodable and Updatable Non-Malleable Codes in the Bounded
                  Retrieval Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {303},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/303},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledKS17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallDKM17,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Tal Malkin},
  title        = {Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees,
                  and Streaming Space-Bounded Tampering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1061},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1061},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallDKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledGK17,
  author       = {Dana Dachman{-}Soled and
                  Huijing Gong and
                  Mukul Kulkarni and
                  Aria Shahverdi},
  title        = {On the Leakage Resilience of Ideal-Lattice Based Public Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1127},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledGK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ChoDJ16,
  author       = {Chongwon Cho and
                  Dana Dachman{-}Soled and
                  Stanislaw Jarecki},
  editor       = {Kazue Sako},
  title        = {Efficient Concurrent Covert Computation of String Equality and Set
                  Intersection},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
                  the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
                  4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9610},
  pages        = {164--179},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29485-8\_10},
  doi          = {10.1007/978-3-319-29485-8\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ChoDJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Dachman-SoledKT16,
  author       = {Dana Dachman{-}Soled and
                  Jonathan Katz and
                  Aishwarya Thiruvengadam},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {10-Round Feistel is Indifferentiable from an Ideal Cipher},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9666},
  pages        = {649--678},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49896-5\_23},
  doi          = {10.1007/978-3-662-49896-5\_23},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Dachman-SoledKT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BallDKM16,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Tal Malkin},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Non-malleable Codes for Bounded Depth, Bounded Fan-In Circuits},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9666},
  pages        = {881--908},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49896-5\_31},
  doi          = {10.1007/978-3-662-49896-5\_31},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BallDKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Dachman-SoledGL16,
  author       = {Dana Dachman{-}Soled and
                  S. Dov Gordon and
                  Feng{-}Hao Liu and
                  Adam O'Neill and
                  Hong{-}Sheng Zhou},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Leakage-Resilient Public-Key Encryption from Obfuscation},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {101--128},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_5},
  doi          = {10.1007/978-3-662-49387-8\_5},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Dachman-SoledGL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Dachman-Soled16,
  author       = {Dana Dachman{-}Soled},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Towards Non-Black-Box Separations of Public Key Encryption and One
                  Way Function},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {169--191},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_7},
  doi          = {10.1007/978-3-662-53644-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Dachman-Soled16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallDKM16,
  author       = {Marshall Ball and
                  Dana Dachman{-}Soled and
                  Mukul Kulkarni and
                  Tal Malkin},
  title        = {Non-Malleable Codes for Bounded Depth, Bounded Fan-in Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {307},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/307},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallDKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledPN16,
  author       = {Dana Dachman{-}Soled and
                  Angela Park and
                  Ben San Nicolas},
  title        = {Towards a Characterization of the Related-Key Attack Security of the
                  Iterated Even-Mansour Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {707},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/707},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledPN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiDMW16,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Tal Malkin and
                  Hoeteck Wee},
  title        = {A Black-Box Construction of Non-Malleable Encryption from Semantically
                  Secure Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {720},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/720},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiDMW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledGL16,
  author       = {Dana Dachman{-}Soled and
                  S. Dov Gordon and
                  Feng{-}Hao Liu and
                  Adam O'Neill and
                  Hong{-}Sheng Zhou},
  title        = {Leakage-Resilient Public-Key Encryption from Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {730},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/730},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledGL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-Soled16,
  author       = {Dana Dachman{-}Soled},
  title        = {Towards Non-Black-Box Separations of Public Key Encryption and One
                  Way Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {812},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/812},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-Soled16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiDMW16a,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Tal Malkin and
                  Hoeteck Wee},
  title        = {Improved, Black-Box, Non-Malleable Encryption from Semantic Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {842},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/842},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiDMW16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Dachman-SoledLP15,
  author       = {Dana Dachman{-}Soled and
                  Chang Liu and
                  Charalampos Papamanthou and
                  Elaine Shi and
                  Uzi Vishkin},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Oblivious Network {RAM} and Leveraging Parallelism to Achieve Obliviousness},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9452},
  pages        = {337--359},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48797-6\_15},
  doi          = {10.1007/978-3-662-48797-6\_15},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Dachman-SoledLP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Dachman-SoledLZ15,
  author       = {Dana Dachman{-}Soled and
                  Feng{-}Hao Liu and
                  Hong{-}Sheng Zhou},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {Leakage-Resilient Circuits Revisited - Optimal Number of Computing
                  Components Without Leak-Free Hardware},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9057},
  pages        = {131--158},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46803-6\_5},
  doi          = {10.1007/978-3-662-46803-6\_5},
  timestamp    = {Thu, 14 Oct 2021 09:58:15 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Dachman-SoledLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/Dachman-SoledFTWW15,
  author       = {Dana Dachman{-}Soled and
                  Vitaly Feldman and
                  Li{-}Yang Tan and
                  Andrew Wan and
                  Karl Wimmer},
  editor       = {Piotr Indyk},
  title        = {Approximate resilience, monotonicity, and the complexity of agnostic
                  learning},
  booktitle    = {Proceedings of the Twenty-Sixth Annual {ACM-SIAM} Symposium on Discrete
                  Algorithms, {SODA} 2015, San Diego, CA, USA, January 4-6, 2015},
  pages        = {498--511},
  publisher    = {{SIAM}},
  year         = {2015},
  url          = {https://doi.org/10.1137/1.9781611973730.34},
  doi          = {10.1137/1.9781611973730.34},
  timestamp    = {Tue, 02 Feb 2021 17:07:30 +0100},
  biburl       = {https://dblp.org/rec/conf/soda/Dachman-SoledFTWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Dachman-SoledLS15,
  author       = {Dana Dachman{-}Soled and
                  Feng{-}Hao Liu and
                  Elaine Shi and
                  Hong{-}Sheng Zhou},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Locally Decodable and Updatable Non-malleable Codes and Their Applications},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {427--450},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_18},
  doi          = {10.1007/978-3-662-46494-6\_18},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/Dachman-SoledLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Dachman-SoledKR15,
  author       = {Dana Dachman{-}Soled and
                  Jonathan Katz and
                  Vanishree Rao},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Adaptively Secure, Universally Composable, Multiparty Computation
                  in Constant Rounds},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9015},
  pages        = {586--613},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46497-7\_23},
  doi          = {10.1007/978-3-662-46497-7\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Dachman-SoledKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledLPSV15,
  author       = {Dana Dachman{-}Soled and
                  Chang Liu and
                  Charalampos Papamanthou and
                  Elaine Shi and
                  Uzi Vishkin},
  title        = {Oblivious Network {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {73},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/073},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledLPSV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledFK15,
  author       = {Dana Dachman{-}Soled and
                  Nils Fleischhacker and
                  Jonathan Katz and
                  Anna Lysyanskaya and
                  Dominique Schr{\"{o}}der},
  title        = {Feasibility and Infeasibility of Secure Computation with Malicious
                  PUFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {405},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/405},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledFK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledKT15,
  author       = {Dana Dachman{-}Soled and
                  Jonathan Katz and
                  Aishwarya Thiruvengadam},
  title        = {10-Round Feistel is Indifferentiable from an Ideal Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {876},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/876},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledKT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BitanskyDL14,
  author       = {Nir Bitansky and
                  Dana Dachman{-}Soled and
                  Huijia Lin},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Leakage-Tolerant Computation with Input-Independent Preprocessing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {146--163},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_9},
  doi          = {10.1007/978-3-662-44381-1\_9},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BitanskyDL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Dachman-SoledFKLS14,
  author       = {Dana Dachman{-}Soled and
                  Nils Fleischhacker and
                  Jonathan Katz and
                  Anna Lysyanskaya and
                  Dominique Schr{\"{o}}der},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Feasibility and Infeasibility of Secure Computation with Malicious
                  PUFs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {405--420},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_23},
  doi          = {10.1007/978-3-662-44381-1\_23},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/Dachman-SoledFKLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Dachman-Soled14,
  author       = {Dana Dachman{-}Soled},
  editor       = {Hugo Krawczyk},
  title        = {A Black-Box Construction of a {CCA2} Encryption Scheme from a Plaintext
                  Aware (sPA1) Encryption Scheme},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {37--55},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_3},
  doi          = {10.1007/978-3-642-54631-0\_3},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Dachman-Soled14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Dachman-SoledFMO14,
  author       = {Dana Dachman{-}Soled and
                  Georg Fuchsbauer and
                  Payman Mohassel and
                  Adam O'Neill},
  editor       = {Hugo Krawczyk},
  title        = {Enhanced Chosen-Ciphertext Security and Applications},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {329--344},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_19},
  doi          = {10.1007/978-3-642-54631-0\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Dachman-SoledFMO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Dachman-Soled14a,
  author       = {Dana Dachman{-}Soled},
  editor       = {Hugo Krawczyk},
  title        = {On Minimal Assumptions for Sender-Deniable Public Key Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {574--591},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_33},
  doi          = {10.1007/978-3-642-54631-0\_33},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Dachman-Soled14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Dachman-SoledMM14,
  author       = {Dana Dachman{-}Soled and
                  Mohammad Mahmoody and
                  Tal Malkin},
  editor       = {Yehuda Lindell},
  title        = {Can Optimally-Fair Coin Tossing Be Based on One-Way Functions?},
  booktitle    = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
                  2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8349},
  pages        = {217--239},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54242-8\_10},
  doi          = {10.1007/978-3-642-54242-8\_10},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/Dachman-SoledMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Dachman-SoledK14,
  author       = {Dana Dachman{-}Soled and
                  Yael Tauman Kalai},
  editor       = {Yehuda Lindell},
  title        = {Securing Circuits and Protocols against 1/poly(k) Tampering Rate},
  booktitle    = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
                  2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8349},
  pages        = {540--565},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54242-8\_23},
  doi          = {10.1007/978-3-642-54242-8\_23},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Dachman-SoledK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Dachman-SoledFTWW14,
  author       = {Dana Dachman{-}Soled and
                  Vitaly Feldman and
                  Li{-}Yang Tan and
                  Andrew Wan and
                  Karl Wimmer},
  title        = {Approximate resilience, monotonicity, and the complexity of agnostic
                  learning},
  journal      = {CoRR},
  volume       = {abs/1405.5268},
  year         = {2014},
  url          = {http://arxiv.org/abs/1405.5268},
  eprinttype    = {arXiv},
  eprint       = {1405.5268},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Dachman-SoledFTWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledLSZ14a,
  author       = {Dana Dachman{-}Soled and
                  Feng{-}Hao Liu and
                  Elaine Shi and
                  Hong{-}Sheng Zhou},
  title        = {Locally Decodable and Updatable Non-Malleable Codes and Their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {663},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/663},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledLSZ14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledLZ14,
  author       = {Dana Dachman{-}Soled and
                  Feng{-}Hao Liu and
                  Hong{-}Sheng Zhou},
  title        = {Leakage-Resilient Circuits Revisited - Optimal Number of Computing
                  Components without Leak-free Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {856},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/856},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledLZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledKR14,
  author       = {Dana Dachman{-}Soled and
                  Jonathan Katz and
                  Vanishree Rao},
  title        = {Adaptively Secure, Universally Composable, Multi-Party Computation
                  in Constant Rounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {858},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/858},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledKR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Dachman-SoledM0V13,
  author       = {Dana Dachman{-}Soled and
                  Tal Malkin and
                  Mariana Raykova and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable
                  Commitments},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8269},
  pages        = {316--336},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42033-7\_17},
  doi          = {10.1007/978-3-642-42033-7\_17},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Dachman-SoledM0V13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BitanskyDG0KLW13,
  author       = {Nir Bitansky and
                  Dana Dachman{-}Soled and
                  Sanjam Garg and
                  Abhishek Jain and
                  Yael Tauman Kalai and
                  Adriana L{\'{o}}pez{-}Alt and
                  Daniel Wichs},
  editor       = {Amit Sahai},
  title        = {Why "Fiat-Shamir for Proofs" Lacks a Proof},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  pages        = {182--201},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_11},
  doi          = {10.1007/978-3-642-36594-2\_11},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BitanskyDG0KLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-Soled13,
  author       = {Dana Dachman{-}Soled},
  title        = {A Black-Box Construction of a {CCA2} Encryption Scheme from a Plaintext
                  Aware Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {680},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/680},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-Soled13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/Dachman-SoledM0Y12,
  author       = {Dana Dachman{-}Soled and
                  Tal Malkin and
                  Mariana Raykova and
                  Moti Yung},
  title        = {Efficient robust private set intersection},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {289--303},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJACT.2012.048080},
  doi          = {10.1504/IJACT.2012.048080},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/Dachman-SoledM0Y12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Dachman-SoledK12,
  author       = {Dana Dachman{-}Soled and
                  Yael Tauman Kalai},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Securing Circuits against Constant-Rate Tampering},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {533--551},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_31},
  doi          = {10.1007/978-3-642-32009-5\_31},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Dachman-SoledK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CanettiDVW12,
  author       = {Ran Canetti and
                  Dana Dachman{-}Soled and
                  Vinod Vaikuntanathan and
                  Hoeteck Wee},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Efficient Password Authenticated Key Exchange via Oblivious Transfer},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {449--466},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_27},
  doi          = {10.1007/978-3-642-30057-8\_27},
  timestamp    = {Mon, 16 Nov 2020 15:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/CanettiDVW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/ChoiDY12,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Moti Yung},
  editor       = {Ivan Visconti and
                  Roberto De Prisco},
  title        = {On the Centrality of Off-Line E-Cash to Concrete Partial Information
                  Games},
  booktitle    = {Security and Cryptography for Networks - 8th International Conference,
                  {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7485},
  pages        = {264--280},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32928-9\_15},
  doi          = {10.1007/978-3-642-32928-9\_15},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/ChoiDY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Dachman-SoledGKM12,
  author       = {Dana Dachman{-}Soled and
                  Rosario Gennaro and
                  Hugo Krawczyk and
                  Tal Malkin},
  editor       = {Ronald Cramer},
  title        = {Computational Extractors and Pseudorandomness},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {383--403},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_22},
  doi          = {10.1007/978-3-642-28914-9\_22},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Dachman-SoledGKM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledK12,
  author       = {Dana Dachman{-}Soled and
                  Yael Tauman Kalai},
  title        = {Securing Circuits Against Constant-Rate Tampering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {366},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/366},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledFMO12,
  author       = {Dana Dachman{-}Soled and
                  Georg Fuchsbauer and
                  Payman Mohassel and
                  Adam O'Neill},
  title        = {Enhanced Chosen-Ciphertext Security and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {543},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/543},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledFMO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-Soled0KL12,
  author       = {Dana Dachman{-}Soled and
                  Abhishek Jain and
                  Yael Tauman Kalai and
                  Adriana L{\'{o}}pez{-}Alt},
  title        = {On the (In)security of the Fiat-Shamir Paradigm, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {706},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/706},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-Soled0KL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-Soled12,
  author       = {Dana Dachman{-}Soled},
  title        = {On the Impossibility of Sender-Deniable Public Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {727},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/727},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-Soled12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Dachman-Soled11,
  author       = {Dana Dachman{-}Soled},
  title        = {On Black-Box Complexity and Adaptive, Universal Composability of Cryptographic
                  Tasks},
  school       = {Columbia University, {USA}},
  year         = {2011},
  url          = {https://doi.org/10.7916/D8K64R2W},
  doi          = {10.7916/D8K64R2W},
  timestamp    = {Fri, 15 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Dachman-Soled11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Dachman-SoledMRY11,
  author       = {Dana Dachman{-}Soled and
                  Tal Malkin and
                  Mariana Raykova and
                  Moti Yung},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Secure Efficient Multiparty Computing of Multivariate Polynomials
                  and Applications},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {130--146},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_8},
  doi          = {10.1007/978-3-642-21554-4\_8},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Dachman-SoledMRY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/approx/Dachman-SoledS11,
  author       = {Dana Dachman{-}Soled and
                  Rocco A. Servedio},
  editor       = {Leslie Ann Goldberg and
                  Klaus Jansen and
                  R. Ravi and
                  Jos{\'{e}} D. P. Rolim},
  title        = {A Canonical Form for Testing Boolean Function Properties},
  booktitle    = {Approximation, Randomization, and Combinatorial Optimization. Algorithms
                  and Techniques - 14th International Workshop, {APPROX} 2011, and 15th
                  International Workshop, {RANDOM} 2011, Princeton, NJ, USA, August
                  17-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6845},
  pages        = {460--471},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22935-0\_39},
  doi          = {10.1007/978-3-642-22935-0\_39},
  timestamp    = {Tue, 21 Sep 2021 09:36:24 +0200},
  biburl       = {https://dblp.org/rec/conf/approx/Dachman-SoledS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Dachman-SoledLMM11,
  author       = {Dana Dachman{-}Soled and
                  Yehuda Lindell and
                  Mohammad Mahmoody and
                  Tal Malkin},
  editor       = {Yuval Ishai},
  title        = {On the Black-Box Complexity of Optimally-Fair Coin Tossing},
  booktitle    = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
                  2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6597},
  pages        = {450--467},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19571-6\_27},
  doi          = {10.1007/978-3-642-19571-6\_27},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/Dachman-SoledLMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledMRV11,
  author       = {Dana Dachman{-}Soled and
                  Tal Malkin and
                  Mariana Raykova and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Adaptive and Concurrent Secure Computation from New Notions of Non-Malleability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {611},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/611},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledMRV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledGKM11,
  author       = {Dana Dachman{-}Soled and
                  Rosario Gennaro and
                  Hugo Krawczyk and
                  Tal Malkin},
  title        = {Computational Extractors and Pseudorandomness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {708},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/708},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledGKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toc/GlasnerS09,
  author       = {Dana Glasner and
                  Rocco A. Servedio},
  title        = {Distribution-Free Testing Lower Bound for Basic Boolean Functions},
  journal      = {Theory Comput.},
  volume       = {5},
  number       = {1},
  pages        = {191--216},
  year         = {2009},
  url          = {https://doi.org/10.4086/toc.2009.v005a010},
  doi          = {10.4086/TOC.2009.V005A010},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toc/GlasnerS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toc/Dachman-SoledLMSWW09,
  author       = {Dana Dachman{-}Soled and
                  Homin K. Lee and
                  Tal Malkin and
                  Rocco A. Servedio and
                  Andrew Wan and
                  Hoeteck Wee},
  title        = {Optimal Cryptographic Hardness of Learning Monotone Functions},
  journal      = {Theory Comput.},
  volume       = {5},
  number       = {1},
  pages        = {257--282},
  year         = {2009},
  url          = {https://doi.org/10.4086/toc.2009.v005a013},
  doi          = {10.4086/TOC.2009.V005A013},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toc/Dachman-SoledLMSWW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Dachman-SoledMRY09,
  author       = {Dana Dachman{-}Soled and
                  Tal Malkin and
                  Mariana Raykova and
                  Moti Yung},
  editor       = {Michel Abdalla and
                  David Pointcheval and
                  Pierre{-}Alain Fouque and
                  Damien Vergnaud},
  title        = {Efficient Robust Private Set Intersection},
  booktitle    = {Applied Cryptography and Network Security, 7th International Conference,
                  {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5536},
  pages        = {125--142},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01957-9\_8},
  doi          = {10.1007/978-3-642-01957-9\_8},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Dachman-SoledMRY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChoiDMW09,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Tal Malkin and
                  Hoeteck Wee},
  editor       = {Mitsuru Matsui},
  title        = {Improved Non-committing Encryption with Applications to Adaptively
                  Secure Protocols},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {287--302},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_17},
  doi          = {10.1007/978-3-642-10366-7\_17},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChoiDMW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ChoiDMW09,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Tal Malkin and
                  Hoeteck Wee},
  editor       = {Omer Reingold},
  title        = {Simple, Black-Box Constructions of Adaptively Secure Protocols},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {387--402},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_23},
  doi          = {10.1007/978-3-642-00457-5\_23},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/ChoiDMW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/Dachman-SoledLMSWW08,
  author       = {Dana Dachman{-}Soled and
                  Homin K. Lee and
                  Tal Malkin and
                  Rocco A. Servedio and
                  Andrew Wan and
                  Hoeteck Wee},
  editor       = {Luca Aceto and
                  Ivan Damg{\aa}rd and
                  Leslie Ann Goldberg and
                  Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Anna Ing{\'{o}}lfsd{\'{o}}ttir and
                  Igor Walukiewicz},
  title        = {Optimal Cryptographic Hardness of Learning Monotone Functions},
  booktitle    = {Automata, Languages and Programming, 35th International Colloquium,
                  {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
                  {I:} Tack {A:} Algorithms, Automata, Complexity, and Games},
  series       = {Lecture Notes in Computer Science},
  volume       = {5125},
  pages        = {36--47},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70575-8\_4},
  doi          = {10.1007/978-3-540-70575-8\_4},
  timestamp    = {Fri, 27 Mar 2020 09:02:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/Dachman-SoledLMSWW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ChoiDMW08,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Tal Malkin and
                  Hoeteck Wee},
  editor       = {Ran Canetti},
  title        = {Black-Box Construction of a Non-malleable Encryption Scheme from Any
                  Semantically Secure One},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {427--444},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_24},
  doi          = {10.1007/978-3-540-78524-8\_24},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/ChoiDMW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/GlasnerS07,
  author       = {Dana Glasner and
                  Vugranam C. Sreedhar},
  title        = {Configuration Reasoning and Ontology ForWeb},
  booktitle    = {2007 {IEEE} International Conference on Services Computing {(SCC}
                  2007), 9-13 July 2007, Salt Lake City, Utah, {USA}},
  pages        = {387--394},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SCC.2007.44},
  doi          = {10.1109/SCC.2007.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEscc/GlasnerS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/approx/GlasnerS07,
  author       = {Dana Glasner and
                  Rocco A. Servedio},
  editor       = {Moses Charikar and
                  Klaus Jansen and
                  Omer Reingold and
                  Jos{\'{e}} D. P. Rolim},
  title        = {Distribution-Free Testing Lower Bounds for Basic Boolean Functions},
  booktitle    = {Approximation, Randomization, and Combinatorial Optimization. Algorithms
                  and Techniques, 10th International Workshop, {APPROX} 2007, and 11th
                  International Workshop, {RANDOM} 2007, Princeton, NJ, USA, August
                  20-22, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4627},
  pages        = {494--508},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74208-1\_36},
  doi          = {10.1007/978-3-540-74208-1\_36},
  timestamp    = {Sat, 30 Sep 2023 09:34:32 +0200},
  biburl       = {https://dblp.org/rec/conf/approx/GlasnerS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics