Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Dana Dachman-Soled
@article{DBLP:journals/corr/abs-2402-04375, author = {Yvonne Zhou and Mingyu Liang and Ivan Brugere and Dana Dachman{-}Soled and Danial Dervovic and Antigoni Polychroniadou and Min Wu}, title = {Bounding the Excess Risk for Linear Models Trained on Marginal-Preserving, Differentially-Private, Synthetic Data}, journal = {CoRR}, volume = {abs/2402.04375}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.04375}, doi = {10.48550/ARXIV.2402.04375}, eprinttype = {arXiv}, eprint = {2402.04375}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-04375.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-07724, author = {Zachary McBride Lazri and Danial Dervovic and Antigoni Polychroniadou and Ivan Brugere and Dana Dachman{-}Soled and Min Wu}, title = {Balancing Fairness and Accuracy in Data-Restricted Binary Classification}, journal = {CoRR}, volume = {abs/2403.07724}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.07724}, doi = {10.48550/ARXIV.2403.07724}, eprinttype = {arXiv}, eprint = {2403.07724}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-07724.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BergamaschiCDKLT24, author = {Flavio Bergamaschi and Anamaria Costache and Dana Dachman{-}Soled and Hunter Kippen and Lucas LaBuff and Rui Tang}, title = {On the Concrete Security of Approximate {FHE} with Noise-Flooding Countermeasures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {424}, year = {2024}, url = {https://eprint.iacr.org/2024/424}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BergamaschiCDKLT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DachmanSoledGHK22, author = {Dana Dachman{-}Soled and Huijing Gong and Tom Hanson and Hunter Kippen}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Revisiting Security Estimation for {LWE} with Hints from a Geometric Perspective}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {748--781}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_24}, doi = {10.1007/978-3-031-38554-4\_24}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DachmanSoledGHK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BallGDM23, author = {Marshall Ball and Eli Goldin and Dana Dachman{-}Soled and Saachi Mutreja}, title = {Extracting Randomness from Samplable Distributions, Revisited}, booktitle = {64th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS} 2023, Santa Cruz, CA, USA, November 6-9, 2023}, pages = {1505--1514}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/FOCS57990.2023.00092}, doi = {10.1109/FOCS57990.2023.00092}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/BallGDM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-15097, author = {Zachary McBride Lazri and Ivan Brugere and Xin Tian and Dana Dachman{-}Soled and Antigoni Polychroniadou and Danial Dervovic and Min Wu}, title = {A Canonical Data Transformation for Achieving Inter- and Within-group Fairness}, journal = {CoRR}, volume = {abs/2310.15097}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.15097}, doi = {10.48550/ARXIV.2310.15097}, eprinttype = {arXiv}, eprint = {2310.15097}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-15097.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/BallD23, author = {Marshall Ball and Dana Dachman{-}Soled}, title = {(Inefficient Prover) ZAPs from Hard-to-Invert Functions}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR23-205}}, year = {2023}, url = {https://eccc.weizmann.ac.il/report/2023/205}, eprinttype = {ECCC}, eprint = {TR23-205}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eccc/BallD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/BallDGM23, author = {Marshall Ball and Dana Dachman{-}Soled and Eli Goldin and Saachi Mutreja}, title = {Extracting Randomness from Samplable Distributions, Revisited}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR23-169}}, year = {2023}, url = {https://eccc.weizmann.ac.il/report/2023/169}, eprinttype = {ECCC}, eprint = {TR23-169}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eccc/BallDGM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiDLLY23, author = {Seung Geol Choi and Dana Dachman{-}Soled and Mingyu Liang and Linsheng Liu and Arkady Yerukhimovich}, title = {On the Privacy of Sublinear-Communication Jaccard Index Estimation via Min-hash Sketching}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1523}, year = {2023}, url = {https://eprint.iacr.org/2023/1523}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChoiDLLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FahrKKDLDGNPYA22, author = {Michael Fahr and Hunter Kippen and Andrew Kwong and Thinh Dang and Jacob Lichtinger and Dana Dachman{-}Soled and Daniel Genkin and Alexander Nelson and Ray A. Perlner and Arkady Yerukhimovich and Daniel Apon}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {979--993}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560673}, doi = {10.1145/3548606.3560673}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FahrKKDLDGNPYA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BallDL22, author = {Marshall Ball and Dana Dachman{-}Soled and Julian Loss}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {(Nondeterministic) Hardness vs. Non-malleability}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {148--177}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_6}, doi = {10.1007/978-3-031-15802-5\_6}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BallDL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ChoiDGLY22, author = {Seung Geol Choi and Dana Dachman{-}Soled and S. Dov Gordon and Linsheng Liu and Arkady Yerukhimovich}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {Secure Sampling with Sublinear Communication}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13748}, pages = {348--377}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22365-5\_13}, doi = {10.1007/978-3-031-22365-5\_13}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/ChoiDGLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/citc/2022, editor = {Dana Dachman{-}Soled}, title = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022, July 5-7, 2022, Cambridge, MA, {USA}}, series = {LIPIcs}, volume = {230}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://www.dagstuhl.de/dagpub/978-3-95977-238-9}, isbn = {978-3-95977-238-9}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/citc/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/BallDL22, author = {Marshall Ball and Dana Dachman{-}Soled and Julian Loss}, title = {(Nondeterministic) Hardness vs. Non-Malleability}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR22-010}}, year = {2022}, url = {https://eccc.weizmann.ac.il/report/2022/010}, eprinttype = {ECCC}, eprint = {TR22-010}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eccc/BallDL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallDL22, author = {Marshall Ball and Dana Dachman{-}Soled and Julian Loss}, title = {(Nondeterministic) Hardness vs. Non-Malleability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {70}, year = {2022}, url = {https://eprint.iacr.org/2022/070}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallDL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledCG22, author = {Dana Dachman{-}Soled and Seung Geol Choi and S. Dov Gordon and Linsheng Liu and Arkady Yerukhimovich}, title = {Secure Sampling with Sublinear Communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {660}, year = {2022}, url = {https://eprint.iacr.org/2022/660}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FahrKKDLDGNPYA22, author = {Michael Fahr and Hunter Kippen and Andrew Kwong and Thinh Dang and Jacob Lichtinger and Dana Dachman{-}Soled and Daniel Genkin and Alexander Nelson and Ray A. Perlner and Arkady Yerukhimovich and Daniel Apon}, title = {When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {952}, year = {2022}, url = {https://eprint.iacr.org/2022/952}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FahrKKDLDGNPYA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledLO22, author = {Dana Dachman{-}Soled and Julian Loss and Adam O'Neill and Nikki Sigurdson}, title = {Breaking {RSA} Generically is Equivalent to Factoring, with Preprocessing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1261}, year = {2022}, url = {https://eprint.iacr.org/2022/1261}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledLO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledGH22, author = {Dana Dachman{-}Soled and Huijing Gong and Tom Hanson and Hunter Kippen}, title = {Refined Security Estimation for {LWE} with Hints via a Geometric Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1345}, year = {2022}, url = {https://eprint.iacr.org/2022/1345}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledGH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Dachman-SoledGK20, author = {Dana Dachman{-}Soled and Huijing Gong and Mukul Kulkarni and Aria Shahverdi}, title = {(In)Security of Ring-LWE Under Partial Key Exposure}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {72--86}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0075}, doi = {10.1515/JMC-2020-0075}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/Dachman-SoledGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/Dachman-SoledGK20a, author = {Dana Dachman{-}Soled and Huijing Gong and Mukul Kulkarni and Aria Shahverdi}, title = {Towards a Ring Analogue of the Leftover Hash Lemma}, journal = {J. Math. Cryptol.}, volume = {15}, number = {1}, pages = {87--110}, year = {2021}, url = {https://doi.org/10.1515/jmc-2020-0076}, doi = {10.1515/JMC-2020-0076}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/Dachman-SoledGK20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChoiDGLY21, author = {Seung Geol Choi and Dana Dachman{-}Soled and S. Dov Gordon and Linsheng Liu and Arkady Yerukhimovich}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Compressed Oblivious Encoding for Homomorphically Encrypted Search}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {2277--2291}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484792}, doi = {10.1145/3460120.3484792}, timestamp = {Tue, 16 Nov 2021 12:59:46 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChoiDGLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Dachman-SoledKP21, author = {Dana Dachman{-}Soled and Ilan Komargodski and Rafael Pass}, editor = {Tal Malkin and Chris Peikert}, title = {Non-malleable Codes for Bounded Parallel-Time Tampering}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {535--565}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_18}, doi = {10.1007/978-3-030-84252-9\_18}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Dachman-SoledKP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Dachman-SoledGK21, author = {Dana Dachman{-}Soled and Huijing Gong and Hunter Kippen and Aria Shahverdi}, editor = {Kobbi Nissim and Brent Waters}, title = {{BKW} Meets Fourier New Algorithms for {LPN} with Sparse Parities}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13043}, pages = {658--688}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90453-1\_23}, doi = {10.1007/978-3-030-90453-1\_23}, timestamp = {Mon, 08 Nov 2021 11:43:29 +0100}, biburl = {https://dblp.org/rec/conf/tcc/Dachman-SoledGK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ShahverdiSD21, author = {Aria Shahverdi and Mahammad Shirinov and Dana Dachman{-}Soled}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Database Reconstruction from Noisy Volumes: {A} Cache Side-Channel Attack on SQLite}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {1019--1035}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/shahverdi}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/ShahverdiSD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-07708, author = {Seung Geol Choi and Dana Dachman{-}Soled and S. Dov Gordon and Linsheng Liu and Arkady Yerukhimovich}, title = {Compressed Oblivious Encoding for Homomorphically Encrypted Search}, journal = {CoRR}, volume = {abs/2109.07708}, year = {2021}, url = {https://arxiv.org/abs/2109.07708}, eprinttype = {arXiv}, eprint = {2109.07708}, timestamp = {Wed, 22 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-07708.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledGK21, author = {Dana Dachman{-}Soled and Huijing Gong and Hunter Kippen and Aria Shahverdi}, title = {{BKW} Meets Fourier: New Algorithms for {LPN} with Sparse Parities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {994}, year = {2021}, url = {https://eprint.iacr.org/2021/994}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledGK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiDGLY21, author = {Seung Geol Choi and Dana Dachman{-}Soled and S. Dov Gordon and Linsheng Liu and Arkady Yerukhimovich}, title = {Compressed Oblivious Encoding for Homomorphically Encrypted Search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1199}, year = {2021}, url = {https://eprint.iacr.org/2021/1199}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoiDGLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Dachman-SoledLS20, author = {Dana Dachman{-}Soled and Feng{-}Hao Liu and Elaine Shi and Hong{-}Sheng Zhou}, title = {Locally Decodable and Updatable Non-malleable Codes and Their Applications}, journal = {J. Cryptol.}, volume = {33}, number = {1}, pages = {319--355}, year = {2020}, url = {https://doi.org/10.1007/s00145-018-9306-z}, doi = {10.1007/S00145-018-9306-Z}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Dachman-SoledLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Dachman-SoledFK20, author = {Dana Dachman{-}Soled and Nils Fleischhacker and Jonathan Katz and Anna Lysyanskaya and Dominique Schr{\"{o}}der}, title = {Feasibility and Infeasibility of Secure Computation with Malicious PUFs}, journal = {J. Cryptol.}, volume = {33}, number = {2}, pages = {595--617}, year = {2020}, url = {https://doi.org/10.1007/s00145-019-09329-9}, doi = {10.1007/S00145-019-09329-9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Dachman-SoledFK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/ChoiDKY20, author = {Seung Geol Choi and Dana Dachman{-}Soled and Mukul Kulkarni and Arkady Yerukhimovich}, title = {Differentially-Private Multi-Party Sketching for Large-Scale Statistics}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2020}, number = {3}, pages = {153--174}, year = {2020}, url = {https://doi.org/10.2478/popets-2020-0047}, doi = {10.2478/POPETS-2020-0047}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/ChoiDKY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Dachman-SoledDG20, author = {Dana Dachman{-}Soled and L{\'{e}}o Ducas and Huijing Gong and M{\'{e}}lissa Rossi}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {{LWE} with Side Information: Attacks and Concrete Security Estimation}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12171}, pages = {329--358}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56880-1\_12}, doi = {10.1007/978-3-030-56880-1\_12}, timestamp = {Thu, 13 Aug 2020 16:42:10 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Dachman-SoledDG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BallDK20, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions, Interaction, and Trust}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {674--703}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_24}, doi = {10.1007/978-3-030-56877-1\_24}, timestamp = {Mon, 28 Aug 2023 21:17:50 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BallDK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/KelseyDMT20, author = {John Kelsey and Dana Dachman{-}Soled and Sweta Mishra and Meltem S{\"{o}}nmez Turan}, editor = {Stanislaw Jarecki}, title = {{TMPS:} Ticket-Mediated Password Strengthening}, booktitle = {Topics in Cryptology - {CT-RSA} 2020 - The Cryptographers' Track at the {RSA} Conference 2020, San Francisco, CA, USA, February 24-28, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12006}, pages = {225--253}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-40186-3\_11}, doi = {10.1007/978-3-030-40186-3\_11}, timestamp = {Tue, 03 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/KelseyDMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/HongDKDD20, author = {Sanghyun Hong and Michael Davinroy and Yigitcan Kaya and Dana Dachman{-}Soled and Tudor Dumitras}, title = {How to 0wn the {NAS} in Your Spare Time}, booktitle = {8th International Conference on Learning Representations, {ICLR} 2020, Addis Ababa, Ethiopia, April 26-30, 2020}, publisher = {OpenReview.net}, year = {2020}, url = {https://openreview.net/forum?id=S1erpeBFPB}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/HongDKDD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/BallDKM20, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni and Tal Malkin}, editor = {Thomas Vidick}, title = {Limits to Non-Malleability}, booktitle = {11th Innovations in Theoretical Computer Science Conference, {ITCS} 2020, January 12-14, 2020, Seattle, Washington, {USA}}, series = {LIPIcs}, volume = {151}, pages = {80:1--80:32}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2020.80}, doi = {10.4230/LIPICS.ITCS.2020.80}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/BallDKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Dachman-Soled20, author = {Dana Dachman{-}Soled}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {Revisiting Fairness in {MPC:} Polynomial Number of Parties and General Adversarial Structures}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12551}, pages = {595--620}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64378-2\_21}, doi = {10.1007/978-3-030-64378-2\_21}, timestamp = {Tue, 15 Dec 2020 12:01:12 +0100}, biburl = {https://dblp.org/rec/conf/tcc/Dachman-Soled20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-06776, author = {Sanghyun Hong and Michael Davinroy and Yigitcan Kaya and Dana Dachman{-}Soled and Tudor Dumitras}, title = {How to 0wn {NAS} in Your Spare Time}, journal = {CoRR}, volume = {abs/2002.06776}, year = {2020}, url = {https://arxiv.org/abs/2002.06776}, eprinttype = {arXiv}, eprint = {2002.06776}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-06776.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-15007, author = {Aria Shahverdi and Mahammad Shirinov and Dana Dachman{-}Soled}, title = {Database Reconstruction from Noisy Volumes: {A} Cache Side-Channel Attack on SQLite}, journal = {CoRR}, volume = {abs/2006.15007}, year = {2020}, url = {https://arxiv.org/abs/2006.15007}, eprinttype = {arXiv}, eprint = {2006.15007}, timestamp = {Wed, 01 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-15007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-04484, author = {Mingliang Chen and Aria Shahverdi and Sarah Anderson and Se Yong Park and Justin Zhang and Dana Dachman{-}Soled and Kristin E. Lauter and Min Wu}, title = {Transparency Tools for Fairness in {AI} (Luskin)}, journal = {CoRR}, volume = {abs/2007.04484}, year = {2020}, url = {https://arxiv.org/abs/2007.04484}, eprinttype = {arXiv}, eprint = {2007.04484}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-04484.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiDKY20, author = {Seung Geol Choi and Dana Dachman{-}Soled and Mukul Kulkarni and Arkady Yerukhimovich}, title = {Differentially-Private Multi-Party Sketching for Large-Scale Statistics}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {29}, year = {2020}, url = {https://eprint.iacr.org/2020/029}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoiDKY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledDG20, author = {Dana Dachman{-}Soled and L{\'{e}}o Ducas and Huijing Gong and M{\'{e}}lissa Rossi}, title = {{LWE} with Side Information: Attacks and Concrete Security Estimation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {292}, year = {2020}, url = {https://eprint.iacr.org/2020/292}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledDG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledKP20, author = {Dana Dachman{-}Soled and Ilan Komargodski and Rafael Pass}, title = {Non-Malleable Codes for Bounded Polynomial Depth Tampering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {776}, year = {2020}, url = {https://eprint.iacr.org/2020/776}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledKP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-Soled20, author = {Dana Dachman{-}Soled}, title = {Revisiting Fairness in {MPC:} Polynomial Number of Parties and General Adversarial Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1430}, year = {2020}, url = {https://eprint.iacr.org/2020/1430}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-Soled20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/Dachman-SoledKS19, author = {Dana Dachman{-}Soled and Mukul Kulkarni and Aria Shahverdi}, title = {Tight upper and lower bounds for leakage-resilient, locally decodable and updatable non-malleable codes}, journal = {Inf. Comput.}, volume = {268}, year = {2019}, url = {https://doi.org/10.1016/j.ic.2019.05.001}, doi = {10.1016/J.IC.2019.05.001}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/Dachman-SoledKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Dachman-SoledGL19, author = {Dana Dachman{-}Soled and S. Dov Gordon and Feng{-}Hao Liu and Adam O'Neill and Hong{-}Sheng Zhou}, title = {Leakage Resilience from Program Obfuscation}, journal = {J. Cryptol.}, volume = {32}, number = {3}, pages = {742--824}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9286-z}, doi = {10.1007/S00145-018-9286-Z}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Dachman-SoledGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Dachman-SoledLP19, author = {Dana Dachman{-}Soled and Chang Liu and Charalampos Papamanthou and Elaine Shi and Uzi Vishkin}, title = {Oblivious Network {RAM} and Leveraging Parallelism to Achieve Obliviousness}, journal = {J. Cryptol.}, volume = {32}, number = {3}, pages = {941--972}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9301-4}, doi = {10.1007/S00145-018-9301-4}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Dachman-SoledLP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BallDKLM19, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni and Huijia Lin and Tal Malkin}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Non-Malleable Codes Against Bounded Polynomial Time Tampering}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {501--530}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_17}, doi = {10.1007/978-3-030-17653-2\_17}, timestamp = {Tue, 14 May 2019 13:47:56 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BallDKLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isvlsi/0001DS19, author = {Yuntao Liu and Dana Dachman{-}Soled and Ankur Srivastava}, title = {Mitigating Reverse Engineering Attacks on Deep Neural Networks}, booktitle = {2019 {IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2019, Miami, FL, USA, July 15-17, 2019}, pages = {657--662}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISVLSI.2019.00122}, doi = {10.1109/ISVLSI.2019.00122}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isvlsi/0001DS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Dachman-SoledK19, author = {Dana Dachman{-}Soled and Mukul Kulkarni}, editor = {Dongdai Lin and Kazue Sako}, title = {Upper and Lower Bounds for Continuous Non-Malleable Codes}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {519--548}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_18}, doi = {10.1007/978-3-030-17253-4\_18}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Dachman-SoledK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/AponDGK19, author = {Daniel Apon and Dana Dachman{-}Soled and Huijing Gong and Jonathan Katz}, editor = {Jintai Ding and Rainer Steinwandt}, title = {Constant-Round Group Key Exchange from the Ring-LWE Assumption}, booktitle = {Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11505}, pages = {189--205}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-25510-7\_11}, doi = {10.1007/978-3-030-25510-7\_11}, timestamp = {Mon, 15 Jul 2019 14:30:19 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/AponDGK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AponDGK19, author = {Daniel Apon and Dana Dachman{-}Soled and Huijing Gong and Jonathan Katz}, title = {Constant-Round Group Key Exchange from the Ring-LWE Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {398}, year = {2019}, url = {https://eprint.iacr.org/2019/398}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AponDGK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallDKM19, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni and Tal Malkin}, title = {Limits to Non-Malleability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {449}, year = {2019}, url = {https://eprint.iacr.org/2019/449}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallDKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KelseyDMT19, author = {John Kelsey and Dana Dachman{-}Soled and Sweta Mishra and Meltem S{\"{o}}nmez Turan}, title = {{TMPS:} Ticket-Mediated Password Strengthening}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {543}, year = {2019}, url = {https://eprint.iacr.org/2019/543}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KelseyDMT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallDK19, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni}, title = {New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions and Interaction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1464}, year = {2019}, url = {https://eprint.iacr.org/2019/1464}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallDK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChoiDMW18, author = {Seung Geol Choi and Dana Dachman{-}Soled and Tal Malkin and Hoeteck Wee}, title = {Improved, black-box, non-malleable encryption from semantic security}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {641--663}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0348-2}, doi = {10.1007/S10623-017-0348-2}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChoiDMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/ChoiDMW18, author = {Seung Geol Choi and Dana Dachman{-}Soled and Tal Malkin and Hoeteck Wee}, title = {A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption}, journal = {J. Cryptol.}, volume = {31}, number = {1}, pages = {172--201}, year = {2018}, url = {https://doi.org/10.1007/s00145-017-9254-z}, doi = {10.1007/S00145-017-9254-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/ChoiDMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BallDKM18, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni and Tal Malkin}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Non-malleable Codes from Average-Case Hardness: {\textdollar}{\textdollar}\{{\textbackslash}mathsf \{A\}\}\{{\textbackslash}mathsf \{C\}\}{\^{}}0{\textdollar}{\textdollar} , Decision Trees, and Streaming Space-Bounded Tampering}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {618--650}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_20}, doi = {10.1007/978-3-319-78372-7\_20}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BallDKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BallDGMT18, author = {Marshall Ball and Dana Dachman{-}Soled and Siyao Guo and Tal Malkin and Li{-}Yang Tan}, editor = {Mikkel Thorup}, title = {Non-Malleable Codes for Small-Depth Circuits}, booktitle = {59th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS} 2018, Paris, France, October 7-9, 2018}, pages = {826--837}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/FOCS.2018.00083}, doi = {10.1109/FOCS.2018.00083}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/BallDGMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Dachman-SoledKS18, author = {Dana Dachman{-}Soled and Mukul Kulkarni and Aria Shahverdi}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Local Non-malleable Codes in the Bounded Retrieval Model}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {281--311}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_10}, doi = {10.1007/978-3-319-76581-5\_10}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Dachman-SoledKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-07673, author = {Marshall Ball and Dana Dachman{-}Soled and Siyao Guo and Tal Malkin and Li{-}Yang Tan}, title = {Non-Malleable Codes for Small-Depth Circuits}, journal = {CoRR}, volume = {abs/1802.07673}, year = {2018}, url = {http://arxiv.org/abs/1802.07673}, eprinttype = {arXiv}, eprint = {1802.07673}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-07673.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-03487, author = {Sanghyun Hong and Michael Davinroy and Yigitcan Kaya and Stuart Nevans Locke and Ian Rackow and Kevin Kulda and Dana Dachman{-}Soled and Tudor Dumitras}, title = {Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks}, journal = {CoRR}, volume = {abs/1810.03487}, year = {2018}, url = {http://arxiv.org/abs/1810.03487}, eprinttype = {arXiv}, eprint = {1810.03487}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-03487.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/BallDGMT18, author = {Marshall Ball and Dana Dachman{-}Soled and Siyao Guo and Tal Malkin and Li{-}Yang Tan}, title = {Non-Malleable Codes for Small-Depth Circuits}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR18-040}}, year = {2018}, url = {https://eccc.weizmann.ac.il/report/2018/040}, eprinttype = {ECCC}, eprint = {TR18-040}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eccc/BallDGMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallDGMT18, author = {Marshall Ball and Dana Dachman{-}Soled and Siyao Guo and Tal Malkin and Li{-}Yang Tan}, title = {Non-Malleable Codes for Small-Depth Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {207}, year = {2018}, url = {http://eprint.iacr.org/2018/207}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallDGMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledK18, author = {Dana Dachman{-}Soled and Mukul Kulkarni}, title = {Upper and Lower Bounds for Continuous Non-Malleable Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {517}, year = {2018}, url = {https://eprint.iacr.org/2018/517}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallDKLM18, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni and Huijia Lin and Tal Malkin}, title = {Non-Malleable Codes Against Bounded Polynomial Time Tampering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1015}, year = {2018}, url = {https://eprint.iacr.org/2018/1015}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallDKLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledGK18, author = {Dana Dachman{-}Soled and Huijing Gong and Mukul Kulkarni and Aria Shahverdi}, title = {Partial Key Exposure in Ring-LWE-Based Cryptosystems: Attacks and Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1068}, year = {2018}, url = {https://eprint.iacr.org/2018/1068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledGK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Dachman-SoledKS17, author = {Dana Dachman{-}Soled and Mukul Kulkarni and Aria Shahverdi}, editor = {Serge Fehr}, title = {Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-malleable Codes}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {310--332}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_13}, doi = {10.1007/978-3-662-54365-8\_13}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Dachman-SoledKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledKS17, author = {Dana Dachman{-}Soled and Mukul Kulkarni and Aria Shahverdi}, title = {Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-Malleable Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {2017}, url = {http://eprint.iacr.org/2017/015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledKS17a, author = {Dana Dachman{-}Soled and Mukul Kulkarni and Aria Shahverdi}, title = {Locally Decodable and Updatable Non-Malleable Codes in the Bounded Retrieval Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {303}, year = {2017}, url = {http://eprint.iacr.org/2017/303}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledKS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallDKM17, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni and Tal Malkin}, title = {Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees, and Streaming Space-Bounded Tampering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1061}, year = {2017}, url = {http://eprint.iacr.org/2017/1061}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallDKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledGK17, author = {Dana Dachman{-}Soled and Huijing Gong and Mukul Kulkarni and Aria Shahverdi}, title = {On the Leakage Resilience of Ideal-Lattice Based Public Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1127}, year = {2017}, url = {http://eprint.iacr.org/2017/1127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledGK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/ChoDJ16, author = {Chongwon Cho and Dana Dachman{-}Soled and Stanislaw Jarecki}, editor = {Kazue Sako}, title = {Efficient Concurrent Covert Computation of String Equality and Set Intersection}, booktitle = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9610}, pages = {164--179}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29485-8\_10}, doi = {10.1007/978-3-319-29485-8\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/ChoDJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Dachman-SoledKT16, author = {Dana Dachman{-}Soled and Jonathan Katz and Aishwarya Thiruvengadam}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {10-Round Feistel is Indifferentiable from an Ideal Cipher}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {649--678}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_23}, doi = {10.1007/978-3-662-49896-5\_23}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Dachman-SoledKT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BallDKM16, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni and Tal Malkin}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Non-malleable Codes for Bounded Depth, Bounded Fan-In Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {881--908}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_31}, doi = {10.1007/978-3-662-49896-5\_31}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BallDKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Dachman-SoledGL16, author = {Dana Dachman{-}Soled and S. Dov Gordon and Feng{-}Hao Liu and Adam O'Neill and Hong{-}Sheng Zhou}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Leakage-Resilient Public-Key Encryption from Obfuscation}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {101--128}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_5}, doi = {10.1007/978-3-662-49387-8\_5}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Dachman-SoledGL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Dachman-Soled16, author = {Dana Dachman{-}Soled}, editor = {Martin Hirt and Adam D. Smith}, title = {Towards Non-Black-Box Separations of Public Key Encryption and One Way Function}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {169--191}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_7}, doi = {10.1007/978-3-662-53644-5\_7}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Dachman-Soled16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallDKM16, author = {Marshall Ball and Dana Dachman{-}Soled and Mukul Kulkarni and Tal Malkin}, title = {Non-Malleable Codes for Bounded Depth, Bounded Fan-in Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {307}, year = {2016}, url = {http://eprint.iacr.org/2016/307}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallDKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledPN16, author = {Dana Dachman{-}Soled and Angela Park and Ben San Nicolas}, title = {Towards a Characterization of the Related-Key Attack Security of the Iterated Even-Mansour Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {707}, year = {2016}, url = {http://eprint.iacr.org/2016/707}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledPN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiDMW16, author = {Seung Geol Choi and Dana Dachman{-}Soled and Tal Malkin and Hoeteck Wee}, title = {A Black-Box Construction of Non-Malleable Encryption from Semantically Secure Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {720}, year = {2016}, url = {http://eprint.iacr.org/2016/720}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoiDMW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledGL16, author = {Dana Dachman{-}Soled and S. Dov Gordon and Feng{-}Hao Liu and Adam O'Neill and Hong{-}Sheng Zhou}, title = {Leakage-Resilient Public-Key Encryption from Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {730}, year = {2016}, url = {http://eprint.iacr.org/2016/730}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledGL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-Soled16, author = {Dana Dachman{-}Soled}, title = {Towards Non-Black-Box Separations of Public Key Encryption and One Way Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {812}, year = {2016}, url = {http://eprint.iacr.org/2016/812}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-Soled16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiDMW16a, author = {Seung Geol Choi and Dana Dachman{-}Soled and Tal Malkin and Hoeteck Wee}, title = {Improved, Black-Box, Non-Malleable Encryption from Semantic Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {842}, year = {2016}, url = {http://eprint.iacr.org/2016/842}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoiDMW16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Dachman-SoledLP15, author = {Dana Dachman{-}Soled and Chang Liu and Charalampos Papamanthou and Elaine Shi and Uzi Vishkin}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Oblivious Network {RAM} and Leveraging Parallelism to Achieve Obliviousness}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9452}, pages = {337--359}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48797-6\_15}, doi = {10.1007/978-3-662-48797-6\_15}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Dachman-SoledLP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Dachman-SoledLZ15, author = {Dana Dachman{-}Soled and Feng{-}Hao Liu and Hong{-}Sheng Zhou}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components Without Leak-Free Hardware}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {131--158}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_5}, doi = {10.1007/978-3-662-46803-6\_5}, timestamp = {Thu, 14 Oct 2021 09:58:15 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Dachman-SoledLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/Dachman-SoledFTWW15, author = {Dana Dachman{-}Soled and Vitaly Feldman and Li{-}Yang Tan and Andrew Wan and Karl Wimmer}, editor = {Piotr Indyk}, title = {Approximate resilience, monotonicity, and the complexity of agnostic learning}, booktitle = {Proceedings of the Twenty-Sixth Annual {ACM-SIAM} Symposium on Discrete Algorithms, {SODA} 2015, San Diego, CA, USA, January 4-6, 2015}, pages = {498--511}, publisher = {{SIAM}}, year = {2015}, url = {https://doi.org/10.1137/1.9781611973730.34}, doi = {10.1137/1.9781611973730.34}, timestamp = {Tue, 02 Feb 2021 17:07:30 +0100}, biburl = {https://dblp.org/rec/conf/soda/Dachman-SoledFTWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Dachman-SoledLS15, author = {Dana Dachman{-}Soled and Feng{-}Hao Liu and Elaine Shi and Hong{-}Sheng Zhou}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Locally Decodable and Updatable Non-malleable Codes and Their Applications}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {427--450}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_18}, doi = {10.1007/978-3-662-46494-6\_18}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/Dachman-SoledLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Dachman-SoledKR15, author = {Dana Dachman{-}Soled and Jonathan Katz and Vanishree Rao}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Adaptively Secure, Universally Composable, Multiparty Computation in Constant Rounds}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9015}, pages = {586--613}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46497-7\_23}, doi = {10.1007/978-3-662-46497-7\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Dachman-SoledKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledLPSV15, author = {Dana Dachman{-}Soled and Chang Liu and Charalampos Papamanthou and Elaine Shi and Uzi Vishkin}, title = {Oblivious Network {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {73}, year = {2015}, url = {http://eprint.iacr.org/2015/073}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledLPSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledFK15, author = {Dana Dachman{-}Soled and Nils Fleischhacker and Jonathan Katz and Anna Lysyanskaya and Dominique Schr{\"{o}}der}, title = {Feasibility and Infeasibility of Secure Computation with Malicious PUFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {405}, year = {2015}, url = {http://eprint.iacr.org/2015/405}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledFK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledKT15, author = {Dana Dachman{-}Soled and Jonathan Katz and Aishwarya Thiruvengadam}, title = {10-Round Feistel is Indifferentiable from an Ideal Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {876}, year = {2015}, url = {http://eprint.iacr.org/2015/876}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledKT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BitanskyDL14, author = {Nir Bitansky and Dana Dachman{-}Soled and Huijia Lin}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Leakage-Tolerant Computation with Input-Independent Preprocessing}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {146--163}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_9}, doi = {10.1007/978-3-662-44381-1\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BitanskyDL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Dachman-SoledFKLS14, author = {Dana Dachman{-}Soled and Nils Fleischhacker and Jonathan Katz and Anna Lysyanskaya and Dominique Schr{\"{o}}der}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Feasibility and Infeasibility of Secure Computation with Malicious PUFs}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {405--420}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_23}, doi = {10.1007/978-3-662-44381-1\_23}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/Dachman-SoledFKLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Dachman-Soled14, author = {Dana Dachman{-}Soled}, editor = {Hugo Krawczyk}, title = {A Black-Box Construction of a {CCA2} Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {37--55}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_3}, doi = {10.1007/978-3-642-54631-0\_3}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Dachman-Soled14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Dachman-SoledFMO14, author = {Dana Dachman{-}Soled and Georg Fuchsbauer and Payman Mohassel and Adam O'Neill}, editor = {Hugo Krawczyk}, title = {Enhanced Chosen-Ciphertext Security and Applications}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {329--344}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_19}, doi = {10.1007/978-3-642-54631-0\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Dachman-SoledFMO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Dachman-Soled14a, author = {Dana Dachman{-}Soled}, editor = {Hugo Krawczyk}, title = {On Minimal Assumptions for Sender-Deniable Public Key Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {574--591}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_33}, doi = {10.1007/978-3-642-54631-0\_33}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Dachman-Soled14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Dachman-SoledMM14, author = {Dana Dachman{-}Soled and Mohammad Mahmoody and Tal Malkin}, editor = {Yehuda Lindell}, title = {Can Optimally-Fair Coin Tossing Be Based on One-Way Functions?}, booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC} 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8349}, pages = {217--239}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54242-8\_10}, doi = {10.1007/978-3-642-54242-8\_10}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/Dachman-SoledMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Dachman-SoledK14, author = {Dana Dachman{-}Soled and Yael Tauman Kalai}, editor = {Yehuda Lindell}, title = {Securing Circuits and Protocols against 1/poly(k) Tampering Rate}, booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC} 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8349}, pages = {540--565}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54242-8\_23}, doi = {10.1007/978-3-642-54242-8\_23}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Dachman-SoledK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Dachman-SoledFTWW14, author = {Dana Dachman{-}Soled and Vitaly Feldman and Li{-}Yang Tan and Andrew Wan and Karl Wimmer}, title = {Approximate resilience, monotonicity, and the complexity of agnostic learning}, journal = {CoRR}, volume = {abs/1405.5268}, year = {2014}, url = {http://arxiv.org/abs/1405.5268}, eprinttype = {arXiv}, eprint = {1405.5268}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Dachman-SoledFTWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledLSZ14a, author = {Dana Dachman{-}Soled and Feng{-}Hao Liu and Elaine Shi and Hong{-}Sheng Zhou}, title = {Locally Decodable and Updatable Non-Malleable Codes and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {663}, year = {2014}, url = {http://eprint.iacr.org/2014/663}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledLSZ14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledLZ14, author = {Dana Dachman{-}Soled and Feng{-}Hao Liu and Hong{-}Sheng Zhou}, title = {Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components without Leak-free Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {856}, year = {2014}, url = {http://eprint.iacr.org/2014/856}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledLZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledKR14, author = {Dana Dachman{-}Soled and Jonathan Katz and Vanishree Rao}, title = {Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {858}, year = {2014}, url = {http://eprint.iacr.org/2014/858}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledKR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Dachman-SoledM0V13, author = {Dana Dachman{-}Soled and Tal Malkin and Mariana Raykova and Muthuramakrishnan Venkitasubramaniam}, editor = {Kazue Sako and Palash Sarkar}, title = {Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8269}, pages = {316--336}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42033-7\_17}, doi = {10.1007/978-3-642-42033-7\_17}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Dachman-SoledM0V13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BitanskyDG0KLW13, author = {Nir Bitansky and Dana Dachman{-}Soled and Sanjam Garg and Abhishek Jain and Yael Tauman Kalai and Adriana L{\'{o}}pez{-}Alt and Daniel Wichs}, editor = {Amit Sahai}, title = {Why "Fiat-Shamir for Proofs" Lacks a Proof}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {182--201}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_11}, doi = {10.1007/978-3-642-36594-2\_11}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BitanskyDG0KLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-Soled13, author = {Dana Dachman{-}Soled}, title = {A Black-Box Construction of a {CCA2} Encryption Scheme from a Plaintext Aware Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {680}, year = {2013}, url = {http://eprint.iacr.org/2013/680}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-Soled13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/Dachman-SoledM0Y12, author = {Dana Dachman{-}Soled and Tal Malkin and Mariana Raykova and Moti Yung}, title = {Efficient robust private set intersection}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {4}, pages = {289--303}, year = {2012}, url = {https://doi.org/10.1504/IJACT.2012.048080}, doi = {10.1504/IJACT.2012.048080}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/Dachman-SoledM0Y12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Dachman-SoledK12, author = {Dana Dachman{-}Soled and Yael Tauman Kalai}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Securing Circuits against Constant-Rate Tampering}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {533--551}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_31}, doi = {10.1007/978-3-642-32009-5\_31}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Dachman-SoledK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CanettiDVW12, author = {Ran Canetti and Dana Dachman{-}Soled and Vinod Vaikuntanathan and Hoeteck Wee}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Efficient Password Authenticated Key Exchange via Oblivious Transfer}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {449--466}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_27}, doi = {10.1007/978-3-642-30057-8\_27}, timestamp = {Mon, 16 Nov 2020 15:55:52 +0100}, biburl = {https://dblp.org/rec/conf/pkc/CanettiDVW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/ChoiDY12, author = {Seung Geol Choi and Dana Dachman{-}Soled and Moti Yung}, editor = {Ivan Visconti and Roberto De Prisco}, title = {On the Centrality of Off-Line E-Cash to Concrete Partial Information Games}, booktitle = {Security and Cryptography for Networks - 8th International Conference, {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7485}, pages = {264--280}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32928-9\_15}, doi = {10.1007/978-3-642-32928-9\_15}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/ChoiDY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Dachman-SoledGKM12, author = {Dana Dachman{-}Soled and Rosario Gennaro and Hugo Krawczyk and Tal Malkin}, editor = {Ronald Cramer}, title = {Computational Extractors and Pseudorandomness}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {383--403}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_22}, doi = {10.1007/978-3-642-28914-9\_22}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Dachman-SoledGKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledK12, author = {Dana Dachman{-}Soled and Yael Tauman Kalai}, title = {Securing Circuits Against Constant-Rate Tampering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {366}, year = {2012}, url = {http://eprint.iacr.org/2012/366}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledFMO12, author = {Dana Dachman{-}Soled and Georg Fuchsbauer and Payman Mohassel and Adam O'Neill}, title = {Enhanced Chosen-Ciphertext Security and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {543}, year = {2012}, url = {http://eprint.iacr.org/2012/543}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledFMO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-Soled0KL12, author = {Dana Dachman{-}Soled and Abhishek Jain and Yael Tauman Kalai and Adriana L{\'{o}}pez{-}Alt}, title = {On the (In)security of the Fiat-Shamir Paradigm, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {706}, year = {2012}, url = {http://eprint.iacr.org/2012/706}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-Soled0KL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-Soled12, author = {Dana Dachman{-}Soled}, title = {On the Impossibility of Sender-Deniable Public Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {727}, year = {2012}, url = {http://eprint.iacr.org/2012/727}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-Soled12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Dachman-Soled11, author = {Dana Dachman{-}Soled}, title = {On Black-Box Complexity and Adaptive, Universal Composability of Cryptographic Tasks}, school = {Columbia University, {USA}}, year = {2011}, url = {https://doi.org/10.7916/D8K64R2W}, doi = {10.7916/D8K64R2W}, timestamp = {Fri, 15 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Dachman-Soled11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Dachman-SoledMRY11, author = {Dana Dachman{-}Soled and Tal Malkin and Mariana Raykova and Moti Yung}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {130--146}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_8}, doi = {10.1007/978-3-642-21554-4\_8}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/acns/Dachman-SoledMRY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/approx/Dachman-SoledS11, author = {Dana Dachman{-}Soled and Rocco A. Servedio}, editor = {Leslie Ann Goldberg and Klaus Jansen and R. Ravi and Jos{\'{e}} D. P. Rolim}, title = {A Canonical Form for Testing Boolean Function Properties}, booktitle = {Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques - 14th International Workshop, {APPROX} 2011, and 15th International Workshop, {RANDOM} 2011, Princeton, NJ, USA, August 17-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6845}, pages = {460--471}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22935-0\_39}, doi = {10.1007/978-3-642-22935-0\_39}, timestamp = {Tue, 21 Sep 2021 09:36:24 +0200}, biburl = {https://dblp.org/rec/conf/approx/Dachman-SoledS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Dachman-SoledLMM11, author = {Dana Dachman{-}Soled and Yehuda Lindell and Mohammad Mahmoody and Tal Malkin}, editor = {Yuval Ishai}, title = {On the Black-Box Complexity of Optimally-Fair Coin Tossing}, booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {450--467}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6\_27}, doi = {10.1007/978-3-642-19571-6\_27}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/Dachman-SoledLMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledMRV11, author = {Dana Dachman{-}Soled and Tal Malkin and Mariana Raykova and Muthuramakrishnan Venkitasubramaniam}, title = {Adaptive and Concurrent Secure Computation from New Notions of Non-Malleability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {611}, year = {2011}, url = {http://eprint.iacr.org/2011/611}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledMRV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledGKM11, author = {Dana Dachman{-}Soled and Rosario Gennaro and Hugo Krawczyk and Tal Malkin}, title = {Computational Extractors and Pseudorandomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {708}, year = {2011}, url = {http://eprint.iacr.org/2011/708}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledGKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toc/GlasnerS09, author = {Dana Glasner and Rocco A. Servedio}, title = {Distribution-Free Testing Lower Bound for Basic Boolean Functions}, journal = {Theory Comput.}, volume = {5}, number = {1}, pages = {191--216}, year = {2009}, url = {https://doi.org/10.4086/toc.2009.v005a010}, doi = {10.4086/TOC.2009.V005A010}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toc/GlasnerS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toc/Dachman-SoledLMSWW09, author = {Dana Dachman{-}Soled and Homin K. Lee and Tal Malkin and Rocco A. Servedio and Andrew Wan and Hoeteck Wee}, title = {Optimal Cryptographic Hardness of Learning Monotone Functions}, journal = {Theory Comput.}, volume = {5}, number = {1}, pages = {257--282}, year = {2009}, url = {https://doi.org/10.4086/toc.2009.v005a013}, doi = {10.4086/TOC.2009.V005A013}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toc/Dachman-SoledLMSWW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Dachman-SoledMRY09, author = {Dana Dachman{-}Soled and Tal Malkin and Mariana Raykova and Moti Yung}, editor = {Michel Abdalla and David Pointcheval and Pierre{-}Alain Fouque and Damien Vergnaud}, title = {Efficient Robust Private Set Intersection}, booktitle = {Applied Cryptography and Network Security, 7th International Conference, {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5536}, pages = {125--142}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01957-9\_8}, doi = {10.1007/978-3-642-01957-9\_8}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/Dachman-SoledMRY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChoiDMW09, author = {Seung Geol Choi and Dana Dachman{-}Soled and Tal Malkin and Hoeteck Wee}, editor = {Mitsuru Matsui}, title = {Improved Non-committing Encryption with Applications to Adaptively Secure Protocols}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {287--302}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_17}, doi = {10.1007/978-3-642-10366-7\_17}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChoiDMW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ChoiDMW09, author = {Seung Geol Choi and Dana Dachman{-}Soled and Tal Malkin and Hoeteck Wee}, editor = {Omer Reingold}, title = {Simple, Black-Box Constructions of Adaptively Secure Protocols}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {387--402}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_23}, doi = {10.1007/978-3-642-00457-5\_23}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/ChoiDMW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/Dachman-SoledLMSWW08, author = {Dana Dachman{-}Soled and Homin K. Lee and Tal Malkin and Rocco A. Servedio and Andrew Wan and Hoeteck Wee}, editor = {Luca Aceto and Ivan Damg{\aa}rd and Leslie Ann Goldberg and Magn{\'{u}}s M. Halld{\'{o}}rsson and Anna Ing{\'{o}}lfsd{\'{o}}ttir and Igor Walukiewicz}, title = {Optimal Cryptographic Hardness of Learning Monotone Functions}, booktitle = {Automata, Languages and Programming, 35th International Colloquium, {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part {I:} Tack {A:} Algorithms, Automata, Complexity, and Games}, series = {Lecture Notes in Computer Science}, volume = {5125}, pages = {36--47}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70575-8\_4}, doi = {10.1007/978-3-540-70575-8\_4}, timestamp = {Fri, 27 Mar 2020 09:02:59 +0100}, biburl = {https://dblp.org/rec/conf/icalp/Dachman-SoledLMSWW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ChoiDMW08, author = {Seung Geol Choi and Dana Dachman{-}Soled and Tal Malkin and Hoeteck Wee}, editor = {Ran Canetti}, title = {Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {427--444}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_24}, doi = {10.1007/978-3-540-78524-8\_24}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/ChoiDMW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/GlasnerS07, author = {Dana Glasner and Vugranam C. Sreedhar}, title = {Configuration Reasoning and Ontology ForWeb}, booktitle = {2007 {IEEE} International Conference on Services Computing {(SCC} 2007), 9-13 July 2007, Salt Lake City, Utah, {USA}}, pages = {387--394}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SCC.2007.44}, doi = {10.1109/SCC.2007.44}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/GlasnerS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/approx/GlasnerS07, author = {Dana Glasner and Rocco A. Servedio}, editor = {Moses Charikar and Klaus Jansen and Omer Reingold and Jos{\'{e}} D. P. Rolim}, title = {Distribution-Free Testing Lower Bounds for Basic Boolean Functions}, booktitle = {Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, 10th International Workshop, {APPROX} 2007, and 11th International Workshop, {RANDOM} 2007, Princeton, NJ, USA, August 20-22, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4627}, pages = {494--508}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74208-1\_36}, doi = {10.1007/978-3-540-74208-1\_36}, timestamp = {Sat, 30 Sep 2023 09:34:32 +0200}, biburl = {https://dblp.org/rec/conf/approx/GlasnerS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.