BibTeX records: Shafi Goldwasser

download as .bib file

@inproceedings{DBLP:conf/nips/GoldwasserGKP23,
  author       = {Shafi Goldwasser and
                  David F. Gruber and
                  Adam Tauman Kalai and
                  Orr Paradise},
  editor       = {Alice Oh and
                  Tristan Naumann and
                  Amir Globerson and
                  Kate Saenko and
                  Moritz Hardt and
                  Sergey Levine},
  title        = {A Theory of Unsupervised Translation Motivated by Understanding Animal
                  Communication},
  booktitle    = {Advances in Neural Information Processing Systems 36: Annual Conference
                  on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans,
                  LA, USA, December 10 - 16, 2023},
  year         = {2023},
  url          = {http://papers.nips.cc/paper\_files/paper/2023/hash/7571c9d44179c7988178593c5b62a9b6-Abstract-Conference.html},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/GoldwasserGKP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GevaGPLRAGBDWMBBWPSLMVBG23,
  author       = {Ravit Geva and
                  Alexander Gusev and
                  Yuriy Polyakov and
                  Lior Liram and
                  Oded Rosolio and
                  Andreea Alexandru and
                  Nicholas Genise and
                  Marcelo Blatt and
                  Zohar Duchin and
                  Barliz Waissengrin and
                  Dan Mirelman and
                  Felix Bukstein and
                  Deborah T. Blumenthal and
                  Ido Wolf and
                  Sharon Pelles{-}Avraham and
                  Tali Schaffer and
                  Lee A. Lavi and
                  Daniele Micciancio and
                  Vinod Vaikuntanathan and
                  Ahmad Al Badawi and
                  Shafi Goldwasser},
  title        = {Collaborative Privacy-Preserving Analysis of Oncological Data using
                  Multiparty Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1203},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1203},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GevaGPLRAGBDWMBBWPSLMVBG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cslaw/BitanCGW22,
  author       = {Dor Bitan and
                  Ran Canetti and
                  Shafi Goldwasser and
                  Rebecca Wexler},
  editor       = {Daniel J. Weitzner and
                  Joan Feigenbaum and
                  Christopher S. Yoo},
  title        = {Using Zero-Knowledge to Reconcile Law Enforcement Secrecy and Fair
                  Trial Rights in Criminal Cases},
  booktitle    = {Proceedings of the 2022 Symposium on Computer Science and Law, {CSLAW}
                  2022, Washington DC, USA, November 1-2, 2022},
  pages        = {9--22},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3511265.3550452},
  doi          = {10.1145/3511265.3550452},
  timestamp    = {Thu, 03 Nov 2022 11:26:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cslaw/BitanCGW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GoldwasserKVZ22,
  author       = {Shafi Goldwasser and
                  Michael P. Kim and
                  Vinod Vaikuntanathan and
                  Or Zamir},
  title        = {Planting Undetectable Backdoors in Machine Learning Models : [Extended
                  Abstract]},
  booktitle    = {63rd {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
                  2022, Denver, CO, USA, October 31 - November 3, 2022},
  pages        = {931--942},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/FOCS54457.2022.00092},
  doi          = {10.1109/FOCS54457.2022.00092},
  timestamp    = {Sat, 31 Dec 2022 17:14:50 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GoldwasserKVZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/ColadangeloGV22,
  author       = {Andrea Coladangelo and
                  Shafi Goldwasser and
                  Umesh V. Vazirani},
  editor       = {Stefano Leonardi and
                  Anupam Gupta},
  title        = {Deniable encryption in a Quantum world},
  booktitle    = {{STOC} '22: 54th Annual {ACM} {SIGACT} Symposium on Theory of Computing,
                  Rome, Italy, June 20 - 24, 2022},
  pages        = {1378--1391},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3519935.3520019},
  doi          = {10.1145/3519935.3520019},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/ColadangeloGV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-06974,
  author       = {Shafi Goldwasser and
                  Michael P. Kim and
                  Vinod Vaikuntanathan and
                  Or Zamir},
  title        = {Planting Undetectable Backdoors in Machine Learning Models},
  journal      = {CoRR},
  volume       = {abs/2204.06974},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.06974},
  doi          = {10.48550/ARXIV.2204.06974},
  eprinttype    = {arXiv},
  eprint       = {2204.06974},
  timestamp    = {Tue, 19 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-06974.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-11081,
  author       = {Shafi Goldwasser and
                  David F. Gruber and
                  Adam Tauman Kalai and
                  Orr Paradise},
  title        = {A Theory of Unsupervised Translation Motivated by Understanding Animal
                  Communication},
  journal      = {CoRR},
  volume       = {abs/2211.11081},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.11081},
  doi          = {10.48550/ARXIV.2211.11081},
  eprinttype    = {arXiv},
  eprint       = {2211.11081},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-11081.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coco/GoldwasserIPS21,
  author       = {Shafi Goldwasser and
                  Russell Impagliazzo and
                  Toniann Pitassi and
                  Rahul Santhanam},
  editor       = {Valentine Kabanets},
  title        = {On the Pseudo-Deterministic Query Complexity of {NP} Search Problems},
  booktitle    = {36th Computational Complexity Conference, {CCC} 2021, July 20-23,
                  2021, Toronto, Ontario, Canada (Virtual Conference)},
  series       = {LIPIcs},
  volume       = {200},
  pages        = {36:1--36:22},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2021},
  url          = {https://doi.org/10.4230/LIPIcs.CCC.2021.36},
  doi          = {10.4230/LIPICS.CCC.2021.36},
  timestamp    = {Thu, 02 Feb 2023 13:27:03 +0100},
  biburl       = {https://dblp.org/rec/conf/coco/GoldwasserIPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalGM21,
  author       = {Shweta Agrawal and
                  Shafi Goldwasser and
                  Saleet Mossel},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Deniable Fully Homomorphic Encryption from Learning with Errors},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {641--670},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_22},
  doi          = {10.1007/978-3-030-84245-1\_22},
  timestamp    = {Mon, 16 Aug 2021 09:08:14 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/GoldwasserRSY21,
  author       = {Shafi Goldwasser and
                  Guy N. Rothblum and
                  Jonathan Shafer and
                  Amir Yehudayoff},
  editor       = {James R. Lee},
  title        = {Interactive Proofs for Verifying Machine Learning},
  booktitle    = {12th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2021, January 6-8, 2021, Virtual Conference},
  series       = {LIPIcs},
  volume       = {185},
  pages        = {41:1--41:19},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2021},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2021.41},
  doi          = {10.4230/LIPICS.ITCS.2021.41},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/GoldwasserRSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-08614,
  author       = {Jacob Andreas and
                  Gasper Begus and
                  Michael M. Bronstein and
                  Roee Diamant and
                  Denley Delaney and
                  Shane Gero and
                  Shafi Goldwasser and
                  David F. Gruber and
                  Sarah de Haas and
                  Peter Malkin and
                  Roger Payne and
                  Giovanni Petri and
                  Daniela Rus and
                  Pratyusha Sharma and
                  Dan Tchernov and
                  Pernille T{\o}nnesen and
                  Antonio Torralba and
                  Daniel M. Vogt and
                  Robert J. Wood},
  title        = {Cetacean Translation Initiative: a roadmap to deciphering the communication
                  of sperm whales},
  journal      = {CoRR},
  volume       = {abs/2104.08614},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.08614},
  eprinttype    = {arXiv},
  eprint       = {2104.08614},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-08614.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-14988,
  author       = {Andrea Coladangelo and
                  Shafi Goldwasser and
                  Umesh V. Vazirani},
  title        = {Deniable Encryption in a Quantum World},
  journal      = {CoRR},
  volume       = {abs/2112.14988},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.14988},
  eprinttype    = {arXiv},
  eprint       = {2112.14988},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-14988.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GargGV20,
  author       = {Sanjam Garg and
                  Shafi Goldwasser and
                  Prashant Nalini Vasudevan},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Formalizing Data Deletion in the Context of the Right to Be Forgotten},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12106},
  pages        = {373--402},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45724-2\_13},
  doi          = {10.1007/978-3-030-45724-2\_13},
  timestamp    = {Mon, 04 May 2020 14:32:28 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GargGV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/GoldwasserGMW20,
  author       = {Shafi Goldwasser and
                  Ofer Grossman and
                  Sidhanth Mohanty and
                  David P. Woodruff},
  editor       = {Thomas Vidick},
  title        = {Pseudo-Deterministic Streaming},
  booktitle    = {11th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2020, January 12-14, 2020, Seattle, Washington, {USA}},
  series       = {LIPIcs},
  volume       = {151},
  pages        = {79:1--79:25},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2020.79},
  doi          = {10.4230/LIPICS.ITCS.2020.79},
  timestamp    = {Mon, 06 Jan 2020 16:50:09 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/GoldwasserGMW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ita/GoldwasserKKM20,
  author       = {Shafi Goldwasser and
                  Adam Tauman Kalai and
                  Yael Tauman Kalai and
                  Omar Montasser},
  title        = {Identifying unpredictable test examples with worst-case guarantees},
  booktitle    = {Information Theory and Applications Workshop, {ITA} 2020, San Diego,
                  CA, USA, February 2-7, 2020},
  pages        = {1--14},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ITA50056.2020.9244996},
  doi          = {10.1109/ITA50056.2020.9244996},
  timestamp    = {Thu, 19 Nov 2020 14:03:02 +0100},
  biburl       = {https://dblp.org/rec/conf/ita/GoldwasserKKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/GoldwasserKKM20,
  author       = {Shafi Goldwasser and
                  Adam Tauman Kalai and
                  Yael Kalai and
                  Omar Montasser},
  editor       = {Hugo Larochelle and
                  Marc'Aurelio Ranzato and
                  Raia Hadsell and
                  Maria{-}Florina Balcan and
                  Hsuan{-}Tien Lin},
  title        = {Beyond Perturbations: Learning Guarantees with Arbitrary Adversarial
                  Test Examples},
  booktitle    = {Advances in Neural Information Processing Systems 33: Annual Conference
                  on Neural Information Processing Systems 2020, NeurIPS 2020, December
                  6-12, 2020, virtual},
  year         = {2020},
  url          = {https://proceedings.neurips.cc/paper/2020/hash/b6c8cf4c587f2ead0c08955ee6e2502b-Abstract.html},
  timestamp    = {Tue, 19 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/GoldwasserKKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-10635,
  author       = {Sanjam Garg and
                  Shafi Goldwasser and
                  Prashant Nalini Vasudevan},
  title        = {Formalizing Data Deletion in the Context of the Right to be Forgotten},
  journal      = {CoRR},
  volume       = {abs/2002.10635},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.10635},
  eprinttype    = {arXiv},
  eprint       = {2002.10635},
  timestamp    = {Tue, 03 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-10635.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-05145,
  author       = {Shafi Goldwasser and
                  Adam Tauman Kalai and
                  Yael Tauman Kalai and
                  Omar Montasser},
  title        = {Beyond Perturbations: Learning Guarantees with Arbitrary Adversarial
                  Test Examples},
  journal      = {CoRR},
  volume       = {abs/2007.05145},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.05145},
  eprinttype    = {arXiv},
  eprint       = {2007.05145},
  timestamp    = {Mon, 20 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-05145.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GoldwasserRSY20,
  author       = {Shafi Goldwasser and
                  Guy N. Rothblum and
                  Jonathan Shafer and
                  Amir Yehudayoff},
  title        = {Interactive Proofs for Verifying Machine Learning},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR20-058}},
  year         = {2020},
  url          = {https://eccc.weizmann.ac.il/report/2020/058},
  eprinttype    = {ECCC},
  eprint       = {TR20-058},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/GoldwasserRSY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargGV20,
  author       = {Sanjam Garg and
                  Shafi Goldwasser and
                  Prashant Nalini Vasudevan},
  title        = {Formalizing Data Deletion in the Context of the Right to be Forgotten},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {254},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/254},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargGV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlattGPG20,
  author       = {Marcelo Blatt and
                  Alexander Gusev and
                  Yuriy Polyakov and
                  Shafi Goldwasser},
  title        = {Secure large-scale genome-wide association studies using homomorphic
                  encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {563},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/563},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlattGPG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalGM20a,
  author       = {Shweta Agrawal and
                  Shafi Goldwasser and
                  Saleet Mossel},
  title        = {Deniable Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1588},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1588},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalGM20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cslaw/Goldwasser19,
  author       = {Shafi Goldwasser},
  title        = {What cryptography can bring to law: keynote presentation},
  booktitle    = {Symposium on Computer Science and Law, {CSLAW} 2019, New York, NY,
                  USA, October 28-29, 2019},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3379921.3379925},
  doi          = {10.1145/3379921.3379925},
  timestamp    = {Mon, 27 Jul 2020 16:05:24 +0200},
  biburl       = {https://dblp.org/rec/conf/cslaw/Goldwasser19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/ChenGLRR19,
  author       = {Lijie Chen and
                  Shafi Goldwasser and
                  Kaifeng Lyu and
                  Guy N. Rothblum and
                  Aviad Rubinstein},
  editor       = {Timothy M. Chan},
  title        = {Fine-grained Complexity Meets {IP} = {PSPACE}},
  booktitle    = {Proceedings of the Thirtieth Annual {ACM-SIAM} Symposium on Discrete
                  Algorithms, {SODA} 2019, San Diego, California, USA, January 6-9,
                  2019},
  pages        = {1--20},
  publisher    = {{SIAM}},
  year         = {2019},
  url          = {https://doi.org/10.1137/1.9781611975482.1},
  doi          = {10.1137/1.9781611975482.1},
  timestamp    = {Thu, 15 Jul 2021 13:49:01 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/ChenGLRR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/acm/19/GoldwasserM19,
  author       = {Shafi Goldwasser and
                  Silvio Micali},
  editor       = {Oded Goldreich},
  title        = {Probabilistic encryption {\&} how to play mental poker keeping
                  secret all partial information},
  booktitle    = {Providing Sound Foundations for Cryptography: On the Work of Shafi
                  Goldwasser and Silvio Micali},
  pages        = {173--201},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335741.3335749},
  doi          = {10.1145/3335741.3335749},
  timestamp    = {Tue, 05 Nov 2019 15:40:16 +0100},
  biburl       = {https://dblp.org/rec/books/acm/19/GoldwasserM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/acm/19/GoldwasserMR19,
  author       = {Shafi Goldwasser and
                  Silvio Micali and
                  Charles Rackoff},
  editor       = {Oded Goldreich},
  title        = {The knowledge complexity of interactive proof-systems},
  booktitle    = {Providing Sound Foundations for Cryptography: On the Work of Shafi
                  Goldwasser and Silvio Micali},
  pages        = {203--225},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335741.3335750},
  doi          = {10.1145/3335741.3335750},
  timestamp    = {Tue, 05 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/acm/19/GoldwasserMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/acm/19/0001GM19,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Silvio Micali},
  editor       = {Oded Goldreich},
  title        = {How to construct random functions},
  booktitle    = {Providing Sound Foundations for Cryptography: On the Work of Shafi
                  Goldwasser and Silvio Micali},
  pages        = {241--264},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335741.3335752},
  doi          = {10.1145/3335741.3335752},
  timestamp    = {Tue, 05 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/acm/19/0001GM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/acm/19/GoldwasserMR19a,
  author       = {Shafi Goldwasser and
                  Silvio Micali and
                  Ronald L. Rivest},
  editor       = {Oded Goldreich},
  title        = {A "paradoxical" solution to the signature problem},
  booktitle    = {Providing Sound Foundations for Cryptography: On the Work of Shafi
                  Goldwasser and Silvio Micali},
  pages        = {265--284},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335741.3335753},
  doi          = {10.1145/3335741.3335753},
  timestamp    = {Tue, 05 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/acm/19/GoldwasserMR19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/acm/19/Ben-OrGW19,
  author       = {Michael Ben{-}Or and
                  Shafi Goldwasser and
                  Avi Wigderson},
  editor       = {Oded Goldreich},
  title        = {Completeness theorems for non-cryptographic fault-tolerant distributed
                  computation},
  booktitle    = {Providing Sound Foundations for Cryptography: On the Work of Shafi
                  Goldwasser and Silvio Micali},
  pages        = {351--371},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335741.3335756},
  doi          = {10.1145/3335741.3335756},
  timestamp    = {Tue, 05 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/acm/19/Ben-OrGW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/acm/19/Ben-OrGKW19,
  author       = {Michael Ben{-}Or and
                  Shafi Goldwasser and
                  Joe Kilian and
                  Avi Wigderson},
  editor       = {Oded Goldreich},
  title        = {Multi-prover interactive proofs: how to remove intractability assumptions},
  booktitle    = {Providing Sound Foundations for Cryptography: On the Work of Shafi
                  Goldwasser and Silvio Micali},
  pages        = {373--410},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335741.3335758},
  doi          = {10.1145/3335741.3335758},
  timestamp    = {Tue, 05 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/acm/19/Ben-OrGKW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-00994,
  author       = {Michel X. Goemans and
                  Shafi Goldwasser and
                  Dhiraj Holden},
  title        = {Doubly-Efficient Pseudo-Deterministic Proofs},
  journal      = {CoRR},
  volume       = {abs/1910.00994},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.00994},
  eprinttype    = {arXiv},
  eprint       = {1910.00994},
  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-00994.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-11368,
  author       = {Shafi Goldwasser and
                  Ofer Grossman and
                  Sidhanth Mohanty and
                  David P. Woodruff},
  title        = {Pseudo-deterministic Streaming},
  journal      = {CoRR},
  volume       = {abs/1911.11368},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.11368},
  eprinttype    = {arXiv},
  eprint       = {1911.11368},
  timestamp    = {Tue, 03 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-11368.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GoemansGH19,
  author       = {Michel X. Goemans and
                  Shafi Goldwasser and
                  Dhiraj Holden},
  title        = {Doubly-Efficient Pseudo-Deterministic Proofs},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR19-135}},
  year         = {2019},
  url          = {https://eccc.weizmann.ac.il/report/2019/135},
  eprinttype    = {ECCC},
  eprint       = {TR19-135},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/GoemansGH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GoldwasserGMW19,
  author       = {Shafi Goldwasser and
                  Ofer Grossman and
                  Sidhanth Mohanty and
                  David P. Woodruff},
  title        = {Pseudo-deterministic Streaming},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR19-177}},
  year         = {2019},
  url          = {https://eccc.weizmann.ac.il/report/2019/177},
  eprinttype    = {ECCC},
  eprint       = {TR19-177},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/GoldwasserGMW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlbrechtCCDGGHH19,
  author       = {Martin R. Albrecht and
                  Melissa Chase and
                  Hao Chen and
                  Jintai Ding and
                  Shafi Goldwasser and
                  Sergey Gorbunov and
                  Shai Halevi and
                  Jeffrey Hoffstein and
                  Kim Laine and
                  Kristin E. Lauter and
                  Satya Lokam and
                  Daniele Micciancio and
                  Dustin Moody and
                  Travis Morrison and
                  Amit Sahai and
                  Vinod Vaikuntanathan},
  title        = {Homomorphic Encryption Standard},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {939},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/939},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlbrechtCCDGGHH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/GoldwasserGH18,
  author       = {Shafi Goldwasser and
                  Ofer Grossman and
                  Dhiraj Holden},
  editor       = {Anna R. Karlin},
  title        = {Pseudo-Deterministic Proofs},
  booktitle    = {9th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2018, January 11-14, 2018, Cambridge, MA, {USA}},
  series       = {LIPIcs},
  volume       = {94},
  pages        = {17:1--17:18},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2018},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2018.17},
  doi          = {10.4230/LIPICS.ITCS.2018.17},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/GoldwasserGH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/GoldwasserOSS18,
  author       = {Shafi Goldwasser and
                  Rafail Ostrovsky and
                  Alessandra Scafuro and
                  Adam Sealfon},
  editor       = {Calvin Newport and
                  Idit Keidar},
  title        = {Population Stability: Regulating Size in the Presence of an Adversary},
  booktitle    = {Proceedings of the 2018 {ACM} Symposium on Principles of Distributed
                  Computing, {PODC} 2018, Egham, United Kingdom, July 23-27, 2018},
  pages        = {397--406},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://dl.acm.org/citation.cfm?id=3212747},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/GoldwasserOSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FranklePSGW18,
  author       = {Jonathan Frankle and
                  Sunoo Park and
                  Daniel Shaar and
                  Shafi Goldwasser and
                  Daniel J. Weitzner},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {Practical Accountability of Secret Processes},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {657--674},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/frankie},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FranklePSGW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-02540,
  author       = {Shafi Goldwasser and
                  Rafail Ostrovsky and
                  Alessandra Scafuro and
                  Adam Sealfon},
  title        = {Population stability: regulating size in the presence of an adversary},
  journal      = {CoRR},
  volume       = {abs/1803.02540},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.02540},
  eprinttype    = {arXiv},
  eprint       = {1803.02540},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-02540.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-02351,
  author       = {Lijie Chen and
                  Shafi Goldwasser and
                  Kaifeng Lyu and
                  Guy N. Rothblum and
                  Aviad Rubinstein},
  title        = {Fine-grained Complexity Meets {IP} = {PSPACE}},
  journal      = {CoRR},
  volume       = {abs/1805.02351},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.02351},
  eprinttype    = {arXiv},
  eprint       = {1805.02351},
  timestamp    = {Fri, 05 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-02351.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserP18,
  author       = {Shafi Goldwasser and
                  Sunoo Park},
  title        = {Public Accountability vs. Secret Laws: Can They Coexist?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {664},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/664},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FranklePSGW18,
  author       = {Jonathan Frankle and
                  Sunoo Park and
                  Daniel Shaar and
                  Shafi Goldwasser and
                  Daniel J. Weitzner},
  title        = {Practical Accountability of Secret Processes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {697},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/697},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FranklePSGW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BitanskyCCGLRT17,
  author       = {Nir Bitansky and
                  Ran Canetti and
                  Alessandro Chiesa and
                  Shafi Goldwasser and
                  Huijia Lin and
                  Aviad Rubinstein and
                  Eran Tromer},
  title        = {The Hunting of the {SNARK}},
  journal      = {J. Cryptol.},
  volume       = {30},
  number       = {4},
  pages        = {989--1066},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00145-016-9241-9},
  doi          = {10.1007/S00145-016-9241-9},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BitanskyCCGLRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/GoldwasserG17,
  author       = {Shafi Goldwasser and
                  Ofer Grossman},
  editor       = {Ioannis Chatzigiannakis and
                  Piotr Indyk and
                  Fabian Kuhn and
                  Anca Muscholl},
  title        = {Bipartite Perfect Matching in Pseudo-Deterministic {NC}},
  booktitle    = {44th International Colloquium on Automata, Languages, and Programming,
                  {ICALP} 2017, July 10-14, 2017, Warsaw, Poland},
  series       = {LIPIcs},
  volume       = {80},
  pages        = {87:1--87:13},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2017},
  url          = {https://doi.org/10.4230/LIPIcs.ICALP.2017.87},
  doi          = {10.4230/LIPICS.ICALP.2017.87},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/GoldwasserG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/GoldwasserH17,
  author       = {Shafi Goldwasser and
                  Dhiraj Holden},
  editor       = {Christos H. Papadimitriou},
  title        = {The Complexity of Problems in {P} Given Correlated Instances},
  booktitle    = {8th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2017, January 9-11, 2017, Berkeley, CA, {USA}},
  series       = {LIPIcs},
  volume       = {67},
  pages        = {13:1--13:19},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2017},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2017.13},
  doi          = {10.4230/LIPICS.ITCS.2017.13},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/GoldwasserH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/WangYGVZ17,
  author       = {Frank Wang and
                  Catherine Yun and
                  Shafi Goldwasser and
                  Vinod Vaikuntanathan and
                  Matei Zaharia},
  editor       = {Aditya Akella and
                  Jon Howell},
  title        = {Splinter: Practical Private Queries on Public Data},
  booktitle    = {14th {USENIX} Symposium on Networked Systems Design and Implementation,
                  {NSDI} 2017, Boston, MA, USA, March 27-29, 2017},
  pages        = {299--313},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/nsdi17/technical-sessions/presentation/wang-frank},
  timestamp    = {Tue, 02 Feb 2021 08:05:04 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/WangYGVZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoldwasserKW17,
  author       = {Shafi Goldwasser and
                  Saleet Klein and
                  Daniel Wichs},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {The Edited Truth},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {305--340},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_11},
  doi          = {10.1007/978-3-319-70500-2\_11},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GoldwasserKW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/GoldwasserP17,
  author       = {Shafi Goldwasser and
                  Sunoo Park},
  editor       = {Bhavani Thuraisingham and
                  Adam J. Lee},
  title        = {Public Accountability vs. Secret Laws: Can They Coexist?: {A} Cryptographic
                  Proposal},
  booktitle    = {Proceedings of the 2017 on Workshop on Privacy in the Electronic Society,
                  Dallas, TX, USA, October 30 - November 3, 2017},
  pages        = {99--110},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139550.3139565},
  doi          = {10.1145/3139550.3139565},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/GoldwasserP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GoldwasserGH17,
  author       = {Shafi Goldwasser and
                  Ofer Grossman and
                  Dhiraj Holden},
  title        = {Pseudo-deterministic Proofs},
  journal      = {CoRR},
  volume       = {abs/1706.04641},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.04641},
  eprinttype    = {arXiv},
  eprint       = {1706.04641},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GoldwasserGH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GoldwasserGH17,
  author       = {Shafi Goldwasser and
                  Ofer Grossman and
                  Dhiraj Holden},
  title        = {Pseudo-Deterministic Proofs},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR17-105}},
  year         = {2017},
  url          = {https://eccc.weizmann.ac.il/report/2017/105},
  eprinttype    = {ECCC},
  eprint       = {TR17-105},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/GoldwasserGH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GoldwasserRK17,
  author       = {Shafi Goldwasser and
                  Guy N. Rothblum and
                  Yael Tauman Kalai},
  title        = {Delegating Computation: Interactive Proofs for Muggles},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR17-108}},
  year         = {2017},
  url          = {https://eccc.weizmann.ac.il/report/2017/108},
  eprinttype    = {ECCC},
  eprint       = {TR17-108},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/GoldwasserRK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserKW17,
  author       = {Shafi Goldwasser and
                  Saleet Klein and
                  Daniel Wichs},
  title        = {The Edited Truth},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {714},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/714},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserKW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/AzarGP16,
  author       = {Pablo Daniel Azar and
                  Shafi Goldwasser and
                  Sunoo Park},
  editor       = {Madhu Sudan},
  title        = {How to Incentivize Data-Driven Collaboration Among Competing Parties},
  booktitle    = {Proceedings of the 2016 {ACM} Conference on Innovations in Theoretical
                  Computer Science, Cambridge, MA, USA, January 14-16, 2016},
  pages        = {213--225},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2840728.2840758},
  doi          = {10.1145/2840728.2840758},
  timestamp    = {Tue, 14 Jun 2022 13:12:41 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/AzarGP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/BitanskyG0PVW16,
  author       = {Nir Bitansky and
                  Shafi Goldwasser and
                  Abhishek Jain and
                  Omer Paneth and
                  Vinod Vaikuntanathan and
                  Brent Waters},
  editor       = {Madhu Sudan},
  title        = {Time-Lock Puzzles from Randomized Encodings},
  booktitle    = {Proceedings of the 2016 {ACM} Conference on Innovations in Theoretical
                  Computer Science, Cambridge, MA, USA, January 14-16, 2016},
  pages        = {345--356},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2840728.2840745},
  doi          = {10.1145/2840728.2840745},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/BitanskyG0PVW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoldwasserK16,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Cryptographic Assumptions: {A} Position Paper},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9562},
  pages        = {505--522},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49096-9\_21},
  doi          = {10.1007/978-3-662-49096-9\_21},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GoldwasserK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/0002GP16,
  author       = {Pablo Azar and
                  Shafi Goldwasser and
                  Sunoo Park},
  title        = {How to Incentivize Data-Driven Collaboration Among Competing Parties},
  journal      = {CoRR},
  volume       = {abs/1601.02298},
  year         = {2016},
  url          = {http://arxiv.org/abs/1601.02298},
  eprinttype    = {arXiv},
  eprint       = {1601.02298},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/0002GP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GoldwasserH16,
  author       = {Shafi Goldwasser and
                  Dhiraj Holden},
  title        = {On the Fine Grained Complexity of Polynomial Time Problems Given Correlated
                  Instances},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR16-056}},
  year         = {2016},
  url          = {https://eccc.weizmann.ac.il/report/2016/056},
  eprinttype    = {ECCC},
  eprint       = {TR16-056},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/GoldwasserH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangYGVZ16,
  author       = {Frank Wang and
                  Catherine Yun and
                  Shafi Goldwasser and
                  Vinod Vaikuntanathan and
                  Matei Zaharia},
  title        = {Splinter: Practical Private Queries on Public Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1148},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1148},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangYGVZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/GoldwasserKR15,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Guy N. Rothblum},
  title        = {Delegating Computation: Interactive Proofs for Muggles},
  journal      = {J. {ACM}},
  volume       = {62},
  number       = {4},
  pages        = {27:1--27:64},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699436},
  doi          = {10.1145/2699436},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jacm/GoldwasserKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/GoldwasserR15,
  author       = {Shafi Goldwasser and
                  Guy N. Rothblum},
  title        = {How to Compute in the Presence of Leakage},
  journal      = {{SIAM} J. Comput.},
  volume       = {44},
  number       = {5},
  pages        = {1480--1549},
  year         = {2015},
  url          = {https://doi.org/10.1137/130931461},
  doi          = {10.1137/130931461},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/GoldwasserR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/GoldwasserKP15,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Sunoo Park},
  editor       = {Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Kazuo Iwama and
                  Naoki Kobayashi and
                  Bettina Speckmann},
  title        = {Adaptively Secure Coin-Flipping, Revisited},
  booktitle    = {Automata, Languages, and Programming - 42nd International Colloquium,
                  {ICALP} 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9135},
  pages        = {663--674},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47666-6\_53},
  doi          = {10.1007/978-3-662-47666-6\_53},
  timestamp    = {Fri, 27 Mar 2020 09:02:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/GoldwasserKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/ChandranCGGOZ15,
  author       = {Nishanth Chandran and
                  Wutichai Chongchitmate and
                  Juan A. Garay and
                  Shafi Goldwasser and
                  Rafail Ostrovsky and
                  Vassilis Zikas},
  editor       = {Tim Roughgarden},
  title        = {The Hidden Graph Model: Communication Locality and Optimal Resiliency
                  with Adaptive Faults},
  booktitle    = {Proceedings of the 2015 Conference on Innovations in Theoretical Computer
                  Science, {ITCS} 2015, Rehovot, Israel, January 11-13, 2015},
  pages        = {153--162},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2688073.2688102},
  doi          = {10.1145/2688073.2688102},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/ChandranCGGOZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/DinurGL15,
  author       = {Irit Dinur and
                  Shafi Goldwasser and
                  Huijia Lin},
  editor       = {Tim Roughgarden},
  title        = {The Computational Benefit of Correlated Instances},
  booktitle    = {Proceedings of the 2015 Conference on Innovations in Theoretical Computer
                  Science, {ITCS} 2015, Rehovot, Israel, January 11-13, 2015},
  pages        = {219--228},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2688073.2688082},
  doi          = {10.1145/2688073.2688082},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/DinurGL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BostPTG15,
  author       = {Raphael Bost and
                  Raluca Ada Popa and
                  Stephen Tu and
                  Shafi Goldwasser},
  title        = {Machine Learning Classification over Encrypted Data},
  booktitle    = {22nd Annual Network and Distributed System Security Symposium, {NDSS}
                  2015, San Diego, California, USA, February 8-11, 2015},
  publisher    = {The Internet Society},
  year         = {2015},
  url          = {https://www.ndss-symposium.org/ndss2015/machine-learning-classification-over-encrypted-data},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BostPTG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CohenGV15,
  author       = {Aloni Cohen and
                  Shafi Goldwasser and
                  Vinod Vaikuntanathan},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Aggregate Pseudorandom Functions and Connections to Learning},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9015},
  pages        = {61--89},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46497-7\_3},
  doi          = {10.1007/978-3-662-46497-7\_3},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CohenGV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CanettiGP15,
  author       = {Ran Canetti and
                  Shafi Goldwasser and
                  Oxana Poburinnaya},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Adaptively Secure Two-Party Computation from Indistinguishability
                  Obfuscation},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9015},
  pages        = {557--585},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46497-7\_22},
  doi          = {10.1007/978-3-662-46497-7\_22},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CanettiGP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GoldwasserKP15,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Sunoo Park},
  title        = {Adaptively Secure Coin-Flipping, Revisited},
  journal      = {CoRR},
  volume       = {abs/1503.01588},
  year         = {2015},
  url          = {http://arxiv.org/abs/1503.01588},
  eprinttype    = {arXiv},
  eprint       = {1503.01588},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GoldwasserKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/CohenGV15,
  author       = {Aloni Cohen and
                  Shafi Goldwasser and
                  Vinod Vaikuntanathan},
  title        = {Aggregate Pseudorandom Functions and Connections to Learning},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR15-009}},
  year         = {2015},
  url          = {https://eccc.weizmann.ac.il/report/2015/009},
  eprinttype    = {ECCC},
  eprint       = {TR15-009},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/CohenGV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GoldwasserG15,
  author       = {Shafi Goldwasser and
                  Ofer Grossman},
  title        = {Perfect Bipartite Matching in Pseudo-Deterministic {RNC}},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR15-208}},
  year         = {2015},
  url          = {https://eccc.weizmann.ac.il/report/2015/208},
  eprinttype    = {ECCC},
  eprint       = {TR15-208},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/GoldwasserG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenGV15,
  author       = {Aloni Cohen and
                  Shafi Goldwasser and
                  Vinod Vaikuntanathan},
  title        = {Aggregatable Pseudorandom Functions and Connections to Learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenGV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AzarGP15,
  author       = {Pablo Azar and
                  Shafi Goldwasser and
                  Sunoo Park},
  title        = {How to Incentivize Data-Driven Collaboration Among Competing Parties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {178},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/178},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AzarGP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserKP15,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Sunoo Park},
  title        = {Adaptively Secure Coin-Flipping, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {202},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/202},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyG0PVW15,
  author       = {Nir Bitansky and
                  Shafi Goldwasser and
                  Abhishek Jain and
                  Omer Paneth and
                  Vinod Vaikuntanathan and
                  Brent Waters},
  title        = {Time-Lock Puzzles from Randomized Encodings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {514},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/514},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyG0PVW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserK15,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai},
  title        = {Cryptographic Assumptions: {A} Position Paper},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {907},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/907},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dc/BoyleGK14,
  author       = {Elette Boyle and
                  Shafi Goldwasser and
                  Yael Tauman Kalai},
  title        = {Leakage-resilient coin tossing},
  journal      = {Distributed Comput.},
  volume       = {27},
  number       = {3},
  pages        = {147--164},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00446-013-0206-z},
  doi          = {10.1007/S00446-013-0206-Z},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dc/BoyleGK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GoldwasserR14,
  author       = {Shafi Goldwasser and
                  Guy N. Rothblum},
  title        = {On Best-Possible Obfuscation},
  journal      = {J. Cryptol.},
  volume       = {27},
  number       = {3},
  pages        = {480--505},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00145-013-9151-z},
  doi          = {10.1007/S00145-013-9151-Z},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/GoldwasserR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toct/AllenderG14,
  author       = {Eric Allender and
                  Shafi Goldwasser},
  title        = {Introduction to the Special Issue on Innovations in Theoretical Computer
                  Science 2012 - Part {II}},
  journal      = {{ACM} Trans. Comput. Theory},
  volume       = {6},
  number       = {3},
  pages        = {10:1},
  year         = {2014},
  url          = {https://doi.org/10.1145/2638595},
  doi          = {10.1145/2638595},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toct/AllenderG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BitanskyCCGKPR14,
  author       = {Nir Bitansky and
                  Ran Canetti and
                  Henry Cohn and
                  Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Omer Paneth and
                  Alon Rosen},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {The Impossibility of Obfuscation with Auxiliary Input or a Universal
                  Simulator},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {71--89},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_5},
  doi          = {10.1007/978-3-662-44381-1\_5},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BitanskyCCGKPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GoldwasserGG0KLSSZ14,
  author       = {Shafi Goldwasser and
                  S. Dov Gordon and
                  Vipul Goyal and
                  Abhishek Jain and
                  Jonathan Katz and
                  Feng{-}Hao Liu and
                  Amit Sahai and
                  Elaine Shi and
                  Hong{-}Sheng Zhou},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Multi-input Functional Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {578--602},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_32},
  doi          = {10.1007/978-3-642-55220-5\_32},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GoldwasserGG0KLSSZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BoyleGI14,
  author       = {Elette Boyle and
                  Shafi Goldwasser and
                  Ioana Ivan},
  editor       = {Hugo Krawczyk},
  title        = {Functional Signatures and Pseudorandom Functions},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {501--519},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_29},
  doi          = {10.1007/978-3-642-54631-0\_29},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BoyleGI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CohnGK14,
  author       = {Henry Cohn and
                  Shafi Goldwasser and
                  Yael Tauman Kalai},
  title        = {The impossibility of obfuscation with a universal simulator},
  journal      = {CoRR},
  volume       = {abs/1401.0348},
  year         = {2014},
  url          = {http://arxiv.org/abs/1401.0348},
  eprinttype    = {arXiv},
  eprint       = {1401.0348},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CohnGK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/DinurGL14,
  author       = {Irit Dinur and
                  Shafi Goldwasser and
                  Huijia Lin},
  title        = {The Computational Benefit of Correlated Instances},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR14-083}},
  year         = {2014},
  url          = {https://eccc.weizmann.ac.il/report/2014/083},
  eprinttype    = {ECCC},
  eprint       = {TR14-083},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/DinurGL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BostPTG14,
  author       = {Raphael Bost and
                  Raluca Ada Popa and
                  Stephen Tu and
                  Shafi Goldwasser},
  title        = {Machine Learning Classification over Encrypted Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {331},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/331},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BostPTG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyCCGLRT14,
  author       = {Nir Bitansky and
                  Ran Canetti and
                  Alessandro Chiesa and
                  Shafi Goldwasser and
                  Huijia Lin and
                  Aviad Rubinstein and
                  Eran Tromer},
  title        = {The Hunting of the {SNARK}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {580},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/580},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyCCGLRT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranCGGOZ14,
  author       = {Nishanth Chandran and
                  Wutichai Chongchitmate and
                  Juan A. Garay and
                  Shafi Goldwasser and
                  Rafail Ostrovsky and
                  Vassilis Zikas},
  title        = {Optimally Resilient and Adaptively Secure Multi-Party Computation
                  with Low Communication Locality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {615},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/615},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandranCGGOZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiGP14,
  author       = {Ran Canetti and
                  Shafi Goldwasser and
                  Oxana Poburinnaya},
  title        = {Adaptively Secure Two-party Computation From Indistinguishability
                  Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {845},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/845},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiGP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toct/AllenderG13,
  author       = {Eric Allender and
                  Shafi Goldwasser},
  title        = {Introduction to the special issue on innovations in theoretical computer
                  science 2012},
  journal      = {{ACM} Trans. Comput. Theory},
  volume       = {5},
  number       = {3},
  pages        = {8:1},
  year         = {2013},
  url          = {https://doi.org/10.1145/2493252.2493253},
  doi          = {10.1145/2493252.2493253},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toct/AllenderG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoldwasserKPVZ13,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Raluca A. Popa and
                  Vinod Vaikuntanathan and
                  Nickolai Zeldovich},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {How to Run Turing Machines on Encrypted Data},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {536--553},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_30},
  doi          = {10.1007/978-3-642-40084-1\_30},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoldwasserKPVZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/GoldreichGR13,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Dana Ron},
  editor       = {Robert D. Kleinberg},
  title        = {On the possibilities and limitations of pseudodeterministic algorithms},
  booktitle    = {Innovations in Theoretical Computer Science, {ITCS} '13, Berkeley,
                  CA, USA, January 9-12, 2013},
  pages        = {127--138},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2422436.2422453},
  doi          = {10.1145/2422436.2422453},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/GoldreichGR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GoldwasserKPVZ13,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Raluca A. Popa and
                  Vinod Vaikuntanathan and
                  Nickolai Zeldovich},
  editor       = {Dan Boneh and
                  Tim Roughgarden and
                  Joan Feigenbaum},
  title        = {Reusable garbled circuits and succinct functional encryption},
  booktitle    = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA,
                  USA, June 1-4, 2013},
  pages        = {555--564},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2488608.2488678},
  doi          = {10.1145/2488608.2488678},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GoldwasserKPVZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BoyleGT13,
  author       = {Elette Boyle and
                  Shafi Goldwasser and
                  Stefano Tessaro},
  editor       = {Amit Sahai},
  title        = {Communication Locality in Secure Multi-party Computation - How to
                  Run Sublinear Algorithms in a Distributed Setting},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  pages        = {356--376},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_21},
  doi          = {10.1007/978-3-642-36594-2\_21},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BoyleGT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserKPVZ13,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Raluca A. Popa and
                  Vinod Vaikuntanathan and
                  Nickolai Zeldovich},
  title        = {Overcoming the Worst-Case Curse for Cryptographic Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {229},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/229},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserKPVZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleGI13,
  author       = {Elette Boyle and
                  Shafi Goldwasser and
                  Ioana Ivan},
  title        = {Functional Signatures and Pseudorandom Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {401},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/401},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleGI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserK13,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai},
  title        = {A Note on the Impossibility of Obfuscation with Auxiliary Input},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {665},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/665},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserG0S13,
  author       = {Shafi Goldwasser and
                  Vipul Goyal and
                  Abhishek Jain and
                  Amit Sahai},
  title        = {Multi-Input Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {727},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/727},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserG0S13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GoldwasserR12,
  author       = {Shafi Goldwasser and
                  Guy N. Rothblum},
  title        = {How to Compute in the Presence of Leakage},
  booktitle    = {53rd Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2012, New Brunswick, NJ, USA, October 20-23, 2012},
  pages        = {31--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/FOCS.2012.34},
  doi          = {10.1109/FOCS.2012.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GoldwasserR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/AkaviaGH12,
  author       = {Adi Akavia and
                  Shafi Goldwasser and
                  Carmit Hazay},
  editor       = {Darek Kowalski and
                  Alessandro Panconesi},
  title        = {Distributed public key schemes secure against continual leakage},
  booktitle    = {{ACM} Symposium on Principles of Distributed Computing, {PODC} '12,
                  Funchal, Madeira, Portugal, July 16-18, 2012},
  pages        = {155--164},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2332432.2332462},
  doi          = {10.1145/2332432.2332462},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/AkaviaGH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stacs/Goldwasser12,
  author       = {Shafi Goldwasser},
  editor       = {Christoph D{\"{u}}rr and
                  Thomas Wilke},
  title        = {Pseudo-deterministic Algorithms (Invited Talk)},
  booktitle    = {29th International Symposium on Theoretical Aspects of Computer Science,
                  {STACS} 2012, February 29th - March 3rd, 2012, Paris, France},
  series       = {LIPIcs},
  volume       = {14},
  pages        = {29--29},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2012},
  url          = {https://doi.org/10.4230/LIPIcs.STACS.2012.29},
  doi          = {10.4230/LIPICS.STACS.2012.29},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/stacs/Goldwasser12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BoyleGJK12,
  author       = {Elette Boyle and
                  Shafi Goldwasser and
                  Abhishek Jain and
                  Yael Tauman Kalai},
  editor       = {Howard J. Karloff and
                  Toniann Pitassi},
  title        = {Multiparty computation secure against continual memory leakage},
  booktitle    = {Proceedings of the 44th Symposium on Theory of Computing Conference,
                  {STOC} 2012, New York, NY, USA, May 19 - 22, 2012},
  pages        = {1235--1254},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2213977.2214087},
  doi          = {10.1145/2213977.2214087},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/BoyleGJK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoldwasserLW12,
  author       = {Shafi Goldwasser and
                  Allison B. Lewko and
                  David A. Wilson},
  editor       = {Ronald Cramer},
  title        = {Bounded-Collusion {IBE} from Key Homomorphism},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {564--581},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_32},
  doi          = {10.1007/978-3-642-28914-9\_32},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GoldwasserLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/innovations/2012,
  editor       = {Shafi Goldwasser},
  title        = {Innovations in Theoretical Computer Science 2012, Cambridge, MA, USA,
                  January 8-10, 2012},
  publisher    = {{ACM}},
  year         = {2012},
  isbn         = {978-1-4503-1115-1},
  timestamp    = {Sat, 24 Mar 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GoldreichGR12,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Dana Ron},
  title        = {On the possibilities and limitations of pseudodeterministic algorithms},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR12-101}},
  year         = {2012},
  url          = {https://eccc.weizmann.ac.il/report/2012/101},
  eprinttype    = {ECCC},
  eprint       = {TR12-101},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/GoldreichGR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GoldwasserR12,
  author       = {Shafi Goldwasser and
                  Guy N. Rothblum},
  title        = {How to Compute in the Presence of Leakage},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR12-010}},
  year         = {2012},
  url          = {https://eccc.weizmann.ac.il/report/2012/010},
  eprinttype    = {ECCC},
  eprint       = {TR12-010},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/GoldwasserR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserKPVZ12,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Raluca A. Popa and
                  Vinod Vaikuntanathan and
                  Nickolai Zeldovich},
  title        = {Succinct Functional Encryption and Applications: Reusable Garbled
                  Circuits and Beyond},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {733},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/733},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserKPVZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BitanskyCGHKR11,
  author       = {Nir Bitansky and
                  Ran Canetti and
                  Shafi Goldwasser and
                  Shai Halevi and
                  Yael Tauman Kalai and
                  Guy N. Rothblum},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {Program Obfuscation with Leaky Hardware},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {722--739},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_39},
  doi          = {10.1007/978-3-642-25385-0\_39},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BitanskyCGHKR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BrakerskiGK11,
  author       = {Zvika Brakerski and
                  Shafi Goldwasser and
                  Yael Tauman Kalai},
  editor       = {Yuval Ishai},
  title        = {Black-Box Circular-Secure Encryption beyond Affine Functions},
  booktitle    = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
                  2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6597},
  pages        = {201--218},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19571-6\_13},
  doi          = {10.1007/978-3-642-19571-6\_13},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BrakerskiGK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/BoyleGK11,
  author       = {Elette Boyle and
                  Shafi Goldwasser and
                  Yael Tauman Kalai},
  editor       = {David Peleg},
  title        = {Leakage-Resilient Coin Tossing},
  booktitle    = {Distributed Computing - 25th International Symposium, {DISC} 2011,
                  Rome, Italy, September 20-22, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6950},
  pages        = {181--196},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24100-0\_16},
  doi          = {10.1007/978-3-642-24100-0\_16},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/BoyleGK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/goldreich2011/GoldreichGH11,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Shai Halevi},
  editor       = {Oded Goldreich},
  title        = {Collision-Free Hashing from Lattice Problems},
  booktitle    = {Studies in Complexity and Cryptography. Miscellanea on the Interplay
                  between Randomness and Computation - In Collaboration with Lidor Avigad,
                  Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali
                  Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan,
                  Salil Vadhan, Avi Wigderson, David Zuckerman},
  series       = {Lecture Notes in Computer Science},
  volume       = {6650},
  pages        = {30--39},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22670-0\_5},
  doi          = {10.1007/978-3-642-22670-0\_5},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/books/sp/goldreich2011/GoldreichGH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GatG11,
  author       = {Eran Gat and
                  Shafi Goldwasser},
  title        = {Probabilistic Search Algorithms with Unique Answers and Their Cryptographic
                  Applications},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR11-136}},
  year         = {2011},
  url          = {https://eccc.weizmann.ac.il/report/2011/136},
  eprinttype    = {ECCC},
  eprint       = {TR11-136},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/GatG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleGK11,
  author       = {Elette Boyle and
                  Shafi Goldwasser and
                  Yael Tauman Kalai},
  title        = {Leakage-Resilient Coin Tossing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {291},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/291},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleGK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserLR11,
  author       = {Shafi Goldwasser and
                  Huijia Lin and
                  Aviad Rubinstein},
  title        = {Delegation of Computation without Rejection Problem from Designated
                  Verifier CS-Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {456},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/456},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserLR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyCGHKR11,
  author       = {Nir Bitansky and
                  Ran Canetti and
                  Shafi Goldwasser and
                  Shai Halevi and
                  Yael Tauman Kalai and
                  Guy N. Rothblum},
  title        = {Program Obfuscation with Leaky Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {660},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/660},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyCGHKR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/GoldreichGN10,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Asaf Nussboim},
  title        = {On the Implementation of Huge Random Objects},
  journal      = {{SIAM} J. Comput.},
  volume       = {39},
  number       = {7},
  pages        = {2761--2822},
  year         = {2010},
  url          = {https://doi.org/10.1137/080722771},
  doi          = {10.1137/080722771},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/siamcomp/GoldreichGN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrakerskiG10,
  author       = {Zvika Brakerski and
                  Shafi Goldwasser},
  editor       = {Tal Rabin},
  title        = {Circular and Leakage Resilient Public-Key Encryption under Subgroup
                  Indistinguishability - (or: Quadratic Residuosity Strikes Back)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_1},
  doi          = {10.1007/978-3-642-14623-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrakerskiG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoldwasserR10,
  author       = {Shafi Goldwasser and
                  Guy N. Rothblum},
  editor       = {Tal Rabin},
  title        = {Securing Computation against Continuous Leakage},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {59--79},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_4},
  doi          = {10.1007/978-3-642-14623-7\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoldwasserR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/GoldwasserKPV10,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Chris Peikert and
                  Vinod Vaikuntanathan},
  editor       = {Andrew Chi{-}Chih Yao},
  title        = {Robustness of the Learning with Errors Assumption},
  booktitle    = {Innovations in Computer Science - {ICS} 2010, Tsinghua University,
                  Beijing, China, January 5-7, 2010. Proceedings},
  pages        = {230--240},
  publisher    = {Tsinghua University Press},
  year         = {2010},
  url          = {http://conference.iiis.tsinghua.edu.cn/ICS2010/content/papers/19.html},
  timestamp    = {Wed, 04 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/GoldwasserKPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/AkaviaGGM10,
  author       = {Adi Akavia and
                  Oded Goldreich and
                  Shafi Goldwasser and
                  Dana Moshkovitz},
  editor       = {Leonard J. Schulman},
  title        = {Erratum for: on basing one-way functions on NP-hardness},
  booktitle    = {Proceedings of the 42nd {ACM} Symposium on Theory of Computing, {STOC}
                  2010, Cambridge, Massachusetts, USA, 5-8 June 2010},
  pages        = {795--796},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1806689.1806798},
  doi          = {10.1145/1806689.1806798},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/AkaviaGGM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisGKPV10,
  author       = {Yevgeniy Dodis and
                  Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Chris Peikert and
                  Vinod Vaikuntanathan},
  editor       = {Daniele Micciancio},
  title        = {Public-Key Encryption Schemes with Auxiliary Inputs},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {361--381},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_22},
  doi          = {10.1007/978-3-642-11799-2\_22},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisGKPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiG10,
  author       = {Zvika Brakerski and
                  Shafi Goldwasser},
  title        = {Circular and Leakage Resilient Public-Key Encryption Under Subgroup
                  Indistinguishability (or: Quadratic Residuosity Strikes Back)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {226},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/226},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Goldwasser09,
  author       = {Shafi Goldwasser},
  editor       = {Antoine Joux},
  title        = {Cryptography without (Hardly Any) Secrets ?},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {369--370},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_21},
  doi          = {10.1007/978-3-642-01001-9\_21},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Goldwasser09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/Goldwasser09,
  author       = {Shafi Goldwasser},
  editor       = {Michael Mitzenmacher},
  title        = {Athena lecture: Controlling Access to Programs?},
  booktitle    = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing,
                  {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009},
  pages        = {167--168},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1536414.1536416},
  doi          = {10.1145/1536414.1536416},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/Goldwasser09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AkaviaGV09,
  author       = {Adi Akavia and
                  Shafi Goldwasser and
                  Vinod Vaikuntanathan},
  editor       = {Omer Reingold},
  title        = {Simultaneous Hardcore Bits and Cryptography against Memory Attacks},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {474--495},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_28},
  doi          = {10.1007/978-3-642-00457-5\_28},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AkaviaGV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BrakerskiGRV09,
  author       = {Zvika Brakerski and
                  Shafi Goldwasser and
                  Guy N. Rothblum and
                  Vinod Vaikuntanathan},
  editor       = {Omer Reingold},
  title        = {Weak Verifiable Random Functions},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {558--576},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_33},
  doi          = {10.1007/978-3-642-00457-5\_33},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BrakerskiGRV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiGK09,
  author       = {Zvika Brakerski and
                  Shafi Goldwasser and
                  Yael Tauman Kalai},
  title        = {Black-Box Circular-Secure Encryption Beyond Affine Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {485},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/485},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiGK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoldwasserKR08,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Guy N. Rothblum},
  editor       = {David A. Wagner},
  title        = {One-Time Programs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5157},
  pages        = {39--56},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85174-5\_3},
  doi          = {10.1007/978-3-540-85174-5\_3},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoldwasserKR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Goldwasser08,
  author       = {Shafi Goldwasser},
  editor       = {Tal Malkin},
  title        = {Program Obfuscation and One-Time Programs},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
                  the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4964},
  pages        = {333--334},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79263-5\_21},
  doi          = {10.1007/978-3-540-79263-5\_21},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Goldwasser08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/CanettiEGL08,
  author       = {Ran Canetti and
                  Dror Eiger and
                  Shafi Goldwasser and
                  Dah{-}Yoh Lim},
  editor       = {Luca Aceto and
                  Ivan Damg{\aa}rd and
                  Leslie Ann Goldberg and
                  Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Anna Ing{\'{o}}lfsd{\'{o}}ttir and
                  Igor Walukiewicz},
  title        = {How to Protect Yourself without Perfect Shredding},
  booktitle    = {Automata, Languages and Programming, 35th International Colloquium,
                  {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
                  {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&}
                  Track {C:} Security and Cryptography Foundations},
  series       = {Lecture Notes in Computer Science},
  volume       = {5126},
  pages        = {511--523},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70583-3\_42},
  doi          = {10.1007/978-3-540-70583-3\_42},
  timestamp    = {Fri, 27 Mar 2020 09:02:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/CanettiEGL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GoldwasserKR08,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Guy N. Rothblum},
  editor       = {Cynthia Dwork},
  title        = {Delegating computation: interactive proofs for muggles},
  booktitle    = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing,
                  Victoria, British Columbia, Canada, May 17-20, 2008},
  pages        = {113--122},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1374376.1374396},
  doi          = {10.1145/1374376.1374396},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GoldwasserKR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GoldwasserGHKR08,
  author       = {Shafi Goldwasser and
                  Dan Gutfreund and
                  Alexander Healy and
                  Tali Kaufman and
                  Guy N. Rothblum},
  editor       = {Cynthia Dwork},
  title        = {A (de)constructive approach to program checking},
  booktitle    = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing,
                  Victoria, British Columbia, Canada, May 17-20, 2008},
  pages        = {143--152},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1374376.1374399},
  doi          = {10.1145/1374376.1374399},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GoldwasserGHKR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2008P8491,
  editor       = {Ran Canetti and
                  Shafi Goldwasser and
                  G{\"{u}}nter M{\"{u}}ller and
                  Rainer Steinwandt},
  title        = {Theoretical Foundations of Practical Information Security, 30.11.
                  - 05.12.2008},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {08491},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/portals/08491/},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2008P8491.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/CanettiGMS08,
  author       = {Ran Canetti and
                  Shafi Goldwasser and
                  G{\"{u}}nter M{\"{u}}ller and
                  Rainer Steinwandt},
  editor       = {Ran Canetti and
                  Shafi Goldwasser and
                  G{\"{u}}nter M{\"{u}}ller and
                  Rainer Steinwandt},
  title        = {08491 Abstracts Collection - Theoretical Foundations of Practical
                  Information Security},
  booktitle    = {Theoretical Foundations of Practical Information Security, 30.11.
                  - 05.12.2008},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {08491},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1894/},
  timestamp    = {Thu, 10 Jun 2021 13:02:08 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/CanettiGMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/CanettiGMS08a,
  author       = {Ran Canetti and
                  Shafi Goldwasser and
                  G{\"{u}}nter M{\"{u}}ller and
                  Rainer Steinwandt},
  editor       = {Ran Canetti and
                  Shafi Goldwasser and
                  G{\"{u}}nter M{\"{u}}ller and
                  Rainer Steinwandt},
  title        = {08491 Executive Summary - Theoretical Foundations of Practical Information
                  Security},
  booktitle    = {Theoretical Foundations of Practical Information Security, 30.11.
                  - 05.12.2008},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {08491},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2008},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1893/},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/CanettiGMS08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiEGL08,
  author       = {Ran Canetti and
                  Dror Eiger and
                  Shafi Goldwasser and
                  Dah{-}Yoh Lim},
  title        = {How to Protect Yourself without Perfect Shredding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {291},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/291},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiEGL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChenCGHV07,
  author       = {Hao Chen and
                  Ronald Cramer and
                  Shafi Goldwasser and
                  Robbert de Haan and
                  Vinod Vaikuntanathan},
  editor       = {Moni Naor},
  title        = {Secure Computation from Random Error Correcting Codes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Barcelona, Spain, May 20-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4515},
  pages        = {291--310},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72540-4\_17},
  doi          = {10.1007/978-3-540-72540-4\_17},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ChenCGHV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GoldwasserGHKR07,
  author       = {Shafi Goldwasser and
                  Dan Gutfreund and
                  Alexander Healy and
                  Tali Kaufman and
                  Guy N. Rothblum},
  editor       = {David S. Johnson and
                  Uriel Feige},
  title        = {Verifying and decoding in constant depth},
  booktitle    = {Proceedings of the 39th Annual {ACM} Symposium on Theory of Computing,
                  San Diego, California, USA, June 11-13, 2007},
  pages        = {440--449},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1250790.1250855},
  doi          = {10.1145/1250790.1250855},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GoldwasserGHKR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoldwasserR07,
  author       = {Shafi Goldwasser and
                  Guy N. Rothblum},
  editor       = {Salil P. Vadhan},
  title        = {On Best-Possible Obfuscation},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {194--213},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_11},
  doi          = {10.1007/978-3-540-70936-7\_11},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GoldwasserR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/GoldwasserGHKR07,
  author       = {Shafi Goldwasser and
                  Dan Gutfreund and
                  Alexander Healy and
                  Tali Kaufman and
                  Guy N. Rothblum},
  title        = {A (De)constructive Approach to Program Checking},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR07-047}},
  year         = {2007},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2007/TR07-047/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR07-047},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/GoldwasserGHKR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GoldwasserPV06,
  author       = {Shafi Goldwasser and
                  Elan Pavlov and
                  Vinod Vaikuntanathan},
  title        = {Fault-Tolerant Distributed Computing in Full-Information Networks},
  booktitle    = {47th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS}
                  2006), 21-24 October 2006, Berkeley, California, USA, Proceedings},
  pages        = {15--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/FOCS.2006.30},
  doi          = {10.1109/FOCS.2006.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GoldwasserPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/AkaviaGGM06,
  author       = {Adi Akavia and
                  Oded Goldreich and
                  Shafi Goldwasser and
                  Dana Moshkovitz},
  editor       = {Jon M. Kleinberg},
  title        = {On basing one-way functions on NP-hardness},
  booktitle    = {Proceedings of the 38th Annual {ACM} Symposium on Theory of Computing,
                  Seattle, WA, USA, May 21-23, 2006},
  pages        = {701--710},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1132516.1132614},
  doi          = {10.1145/1132516.1132614},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/AkaviaGGM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GoldwasserL05,
  author       = {Shafi Goldwasser and
                  Yehuda Lindell},
  title        = {Secure Multi-Party Computation without Agreement},
  journal      = {J. Cryptol.},
  volume       = {18},
  number       = {3},
  pages        = {247--287},
  year         = {2005},
  url          = {https://doi.org/10.1007/s00145-005-0319-z},
  doi          = {10.1007/S00145-005-0319-Z},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/GoldwasserL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GoldwasserK05,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai},
  title        = {On the Impossibility of Obfuscation with Auxiliary Input},
  booktitle    = {46th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS}
                  2005), 23-25 October 2005, Pittsburgh, PA, USA, Proceedings},
  pages        = {553--562},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SFCS.2005.60},
  doi          = {10.1109/SFCS.2005.60},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GoldwasserK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoldwasserK05,
  author       = {Shafi Goldwasser and
                  Dmitriy Kharchenko},
  editor       = {Joe Kilian},
  title        = {Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem},
  booktitle    = {Theory of Cryptography, Second Theory of Cryptography Conference,
                  {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3378},
  pages        = {529--555},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30576-7\_29},
  doi          = {10.1007/978-3-540-30576-7\_29},
  timestamp    = {Sun, 02 Jun 2019 21:21:22 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GoldwasserK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/GoldwasserSV05,
  author       = {Shafi Goldwasser and
                  Madhu Sudan and
                  Vinod Vaikuntanathan},
  editor       = {Pierre Fraigniaud},
  title        = {Distributed Computing with Imperfect Randomness},
  booktitle    = {Distributed Computing, 19th International Conference, {DISC} 2005,
                  Cracow, Poland, September 26-29, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3724},
  pages        = {288--302},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11561927\_22},
  doi          = {10.1007/11561927\_22},
  timestamp    = {Tue, 14 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/GoldwasserSV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoldwasserW04,
  author       = {Shafi Goldwasser and
                  Erez Waisbard},
  editor       = {Moni Naor},
  title        = {Transformation of Digital Signature Schemes into Designated Confirmer
                  Signature Schemes},
  booktitle    = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
                  2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2951},
  pages        = {77--100},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24638-1\_5},
  doi          = {10.1007/978-3-540-24638-1\_5},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GoldwasserW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GoldreichGN03,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Asaf Nussboim},
  title        = {On the Implementation of Huge Random Objects},
  booktitle    = {44th Symposium on Foundations of Computer Science {(FOCS} 2003), 11-14
                  October 2003, Cambridge, MA, USA, Proceedings},
  pages        = {68--79},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SFCS.2003.1238182},
  doi          = {10.1109/SFCS.2003.1238182},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GoldreichGN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GoldwasserK03,
  author       = {Shafi Goldwasser and
                  Yael Tauman Kalai},
  title        = {On the (In)security of the Fiat-Shamir Paradigm},
  booktitle    = {44th Symposium on Foundations of Computer Science {(FOCS} 2003), 11-14
                  October 2003, Cambridge, MA, USA, Proceedings},
  pages        = {102--113},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SFCS.2003.1238185},
  doi          = {10.1109/SFCS.2003.1238185},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GoldwasserK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/AkaviaGS03,
  author       = {Adi Akavia and
                  Shafi Goldwasser and
                  Shmuel Safra},
  title        = {Proving Hard-Core Predicates Using List Decoding},
  booktitle    = {44th Symposium on Foundations of Computer Science {(FOCS} 2003), 11-14
                  October 2003, Cambridge, MA, USA, Proceedings},
  pages        = {146--157},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SFCS.2003.1238189},
  doi          = {10.1109/SFCS.2003.1238189},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/focs/AkaviaGS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR03-015,
  author       = {Shafi Goldwasser and
                  Yael Tauman},
  title        = {On the (In)security of the Fiat-Shamir Paradigm},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR03-015}},
  year         = {2003},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2003/TR03-015/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR03-015},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR03-015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR03-045,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Asaf Nussboim},
  title        = {On the Implementation of Huge Random Objects},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR03-045}},
  year         = {2003},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2003/TR03-045/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR03-045},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR03-045.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserT03,
  author       = {Shafi Goldwasser and
                  Yael Tauman},
  title        = {On the (In)security of the Fiat-Shamir Paradigm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/034},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0018102,
  author       = {Daniele Micciancio and
                  Shafi Goldwasser},
  title        = {Complexity of lattice problems - a cryptographic perspective},
  series       = {The Kluwer international series in engineering and computer science},
  volume       = {671},
  publisher    = {Springer},
  year         = {2002},
  isbn         = {978-0-7923-7688-0},
  timestamp    = {Tue, 13 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0018102.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/GoldwasserL02,
  author       = {Shafi Goldwasser and
                  Yehuda Lindell},
  editor       = {Dahlia Malkhi},
  title        = {Secure Computation without Agreement},
  booktitle    = {Distributed Computing, 16th International Conference, {DISC} 2002,
                  Toulouse, France, October 28-30, 2002 Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2508},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36108-1\_2},
  doi          = {10.1007/3-540-36108-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/GoldwasserL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldwasserL02,
  author       = {Shafi Goldwasser and
                  Yehuda Lindell},
  title        = {Secure Computation Without Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {40},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/040},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldwasserL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BellareFGM01,
  author       = {Mihir Bellare and
                  Marc Fischlin and
                  Shafi Goldwasser and
                  Silvio Micali},
  editor       = {Birgit Pfitzmann},
  title        = {Identification Protocols Secure against Reset Attacks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {495--511},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_30},
  doi          = {10.1007/3-540-44987-6\_30},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BellareFGM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/BarakGGL01,
  author       = {Boaz Barak and
                  Oded Goldreich and
                  Shafi Goldwasser and
                  Yehuda Lindell},
  title        = {Resettably-Sound Zero-Knowledge and its Applications},
  booktitle    = {42nd Annual Symposium on Foundations of Computer Science, {FOCS} 2001,
                  14-17 October 2001, Las Vegas, Nevada, {USA}},
  pages        = {116--125},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/SFCS.2001.959886},
  doi          = {10.1109/SFCS.2001.959886},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/BarakGGL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakGGL01,
  author       = {Boaz Barak and
                  Oded Goldreich and
                  Shafi Goldwasser and
                  Yehuda Lindell},
  title        = {Resettably-Sound Zero-Knowledge and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {63},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/063},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakGGL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/combinatorica/GoldreichGLRS00,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Eric Lehman and
                  Dana Ron and
                  Alex Samorodnitsky},
  title        = {Testing Monotonicity},
  journal      = {Comb.},
  volume       = {20},
  number       = {3},
  pages        = {301--337},
  year         = {2000},
  url          = {https://doi.org/10.1007/s004930070011},
  doi          = {10.1007/S004930070011},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/combinatorica/GoldreichGLRS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/GoldreichG00,
  author       = {Oded Goldreich and
                  Shafi Goldwasser},
  title        = {On the Limits of Nonapproximability of Lattice Problems},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {60},
  number       = {3},
  pages        = {540--563},
  year         = {2000},
  url          = {https://doi.org/10.1006/jcss.1999.1686},
  doi          = {10.1006/JCSS.1999.1686},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/GoldreichG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/CanettiGGM00,
  author       = {Ran Canetti and
                  Oded Goldreich and
                  Shafi Goldwasser and
                  Silvio Micali},
  editor       = {F. Frances Yao and
                  Eugene M. Luks},
  title        = {Resettable zero-knowledge (extended abstract)},
  booktitle    = {Proceedings of the Thirty-Second Annual {ACM} Symposium on Theory
                  of Computing, May 21-23, 2000, Portland, OR, {USA}},
  pages        = {235--244},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/335305.335334},
  doi          = {10.1145/335305.335334},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/CanettiGGM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareFGM00,
  author       = {Mihir Bellare and
                  Marc Fischlin and
                  Shafi Goldwasser and
                  Silvio Micali},
  title        = {Identification Protocols Secure Against Reset Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareFGM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/GoldwasserK99,
  author       = {Shafi Goldwasser and
                  Joe Kilian},
  title        = {Primality Testing Using Elliptic Curves},
  journal      = {J. {ACM}},
  volume       = {46},
  number       = {4},
  pages        = {450--472},
  year         = {1999},
  url          = {https://doi.org/10.1145/320211.320213},
  doi          = {10.1145/320211.320213},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/GoldwasserK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CanettiG99,
  author       = {Ran Canetti and
                  Shafi Goldwasser},
  editor       = {Jacques Stern},
  title        = {An Efficient \emph{Threshold} Public Key Cryptosystem Secure Against
                  Adaptive Chosen Ciphertext Attack},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {90--106},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_7},
  doi          = {10.1007/3-540-48910-X\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CanettiG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR99-024,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Silvio Micali},
  title        = {Interleaved Zero-Knowledge in the Public-Key Model},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR99-024}},
  year         = {1999},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/1999/TR99-024/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR99-024},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR99-024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR99-042,
  author       = {Ran Canetti and
                  Oded Goldreich and
                  Shafi Goldwasser and
                  Silvio Micali},
  title        = {Resettable Zero-Knowledge},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR99-042}},
  year         = {1999},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/1999/TR99-042/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR99-042},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR99-042.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldreichGM99,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Silvio Micali},
  title        = {Interleaved Zero-Knowledge in the Public-Key Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {1999},
  url          = {http://eprint.iacr.org/1999/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldreichGM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiGGM99,
  author       = {Ran Canetti and
                  Oded Goldreich and
                  Shafi Goldwasser and
                  Silvio Micali},
  title        = {Resettable Zero-Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {22},
  year         = {1999},
  url          = {http://eprint.iacr.org/1999/022},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiGGM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/GoldreichGR98,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Dana Ron},
  title        = {Property Testing and its Connection to Learning and Approximation},
  journal      = {J. {ACM}},
  volume       = {45},
  number       = {4},
  pages        = {653--750},
  year         = {1998},
  url          = {https://doi.org/10.1145/285055.285060},
  doi          = {10.1145/285055.285060},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jacm/GoldreichGR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/GoldreichGL98,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Nathan Linial},
  title        = {Fault-Tolerant Computation in the Full Information Model},
  journal      = {{SIAM} J. Comput.},
  volume       = {27},
  number       = {2},
  pages        = {506--544},
  year         = {1998},
  url          = {https://doi.org/10.1137/S0097539793246689},
  doi          = {10.1137/S0097539793246689},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/siamcomp/GoldreichGL98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/Goldwasser98,
  author       = {Shafi Goldwasser},
  title        = {Introduction to Special Section on Probabilistic Proof Systems},
  journal      = {{SIAM} J. Comput.},
  volume       = {27},
  number       = {3},
  pages        = {737--738},
  year         = {1998},
  url          = {https://doi.org/10.1137/SMJCAT000027000003000737000001},
  doi          = {10.1137/SMJCAT000027000003000737000001},
  timestamp    = {Fri, 23 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/Goldwasser98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GoldreichGLR98,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Eric Lehman and
                  Dana Ron},
  title        = {Testing Monotonicity},
  booktitle    = {39th Annual Symposium on Foundations of Computer Science, {FOCS} '98,
                  November 8-11, 1998, Palo Alto, California, {USA}},
  pages        = {426--435},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/SFCS.1998.743493},
  doi          = {10.1109/SFCS.1998.743493},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GoldreichGLR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/random/GertnerGM98,
  author       = {Yael Gertner and
                  Shafi Goldwasser and
                  Tal Malkin},
  editor       = {Michael Luby and
                  Jos{\'{e}} D. P. Rolim and
                  Maria J. Serna},
  title        = {A Random Server Model for Private Information Retrieval or How to
                  Achieve Information Theoretic {PIR} Avoiding Database Replication},
  booktitle    = {Randomization and Approximation Techniques in Computer Science, Second
                  International Workshop, RANDOM'98, Barcelona, Spain, October 8-10,
                  1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1518},
  pages        = {200--217},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49543-6\_17},
  doi          = {10.1007/3-540-49543-6\_17},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/random/GertnerGM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GoldreichG98,
  author       = {Oded Goldreich and
                  Shafi Goldwasser},
  editor       = {Jeffrey Scott Vitter},
  title        = {On the Limits of Non-Approximability of Lattice Problems},
  booktitle    = {Proceedings of the Thirtieth Annual {ACM} Symposium on the Theory
                  of Computing, Dallas, Texas, USA, May 23-26, 1998},
  pages        = {1--9},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/276698.276704},
  doi          = {10.1145/276698.276704},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GoldreichG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldreichG98,
  author       = {Oded Goldreich and
                  Shafi Goldwasser},
  title        = {On the possibility of basing Cryptography on the assumption that {P}
                  {\(\not =\)} {NP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {5},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/005},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldreichG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GertnerGM98,
  author       = {Yael Gertner and
                  Shafi Goldwasser and
                  Tal Malkin},
  title        = {A Random Server Model for Private Information Retrieval (or How to
                  Achieve Information Theoretic {PIR} Avoiding Data Replication)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GertnerGM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BellareG97,
  author       = {Mihir Bellare and
                  Shafi Goldwasser},
  editor       = {Richard Graveman and
                  Philippe A. Janson and
                  Clifford Neuman and
                  Li Gong},
  title        = {Verifiable Partial Key Escrow},
  booktitle    = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and
                  Communications Security, Zurich, Switzerland, April 1-4, 1997},
  pages        = {78--91},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/266420.266439},
  doi          = {10.1145/266420.266439},
  timestamp    = {Tue, 10 Nov 2020 20:00:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BellareG97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoldreichGH97,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Shai Halevi},
  editor       = {Burton S. Kaliski Jr.},
  title        = {Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {105--111},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052230},
  doi          = {10.1007/BFB0052230},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoldreichGH97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoldreichGH97a,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Shai Halevi},
  editor       = {Burton S. Kaliski Jr.},
  title        = {Public-Key Cryptosystems from Lattice Reduction Problems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {112--131},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052231},
  doi          = {10.1007/BFB0052231},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/GoldreichGH97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareGM97,
  author       = {Mihir Bellare and
                  Shafi Goldwasser and
                  Daniele Micciancio},
  editor       = {Burton S. Kaliski Jr.},
  title        = {"Pseudo-Random" Number Generation Within Cryptographic Algorithms:
                  The {DDS} Case},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {277--291},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052242},
  doi          = {10.1007/BFB0052242},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareGM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/Goldwasser97,
  author       = {Shafi Goldwasser},
  title        = {New Directions in Cryptography: Twenty Some Years Later},
  booktitle    = {38th Annual Symposium on Foundations of Computer Science, {FOCS} '97,
                  Miami Beach, Florida, USA, October 19-22, 1997},
  pages        = {314--324},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/SFCS.1997.646120},
  doi          = {10.1109/SFCS.1997.646120},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/Goldwasser97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/Goldwasser97,
  author       = {Shafi Goldwasser},
  editor       = {James E. Burns and
                  Hagit Attiya},
  title        = {Multi-Party Computations: Past and Present},
  booktitle    = {Proceedings of the Sixteenth Annual {ACM} Symposium on Principles
                  of Distributed Computing, Santa Barbara, California, USA, August 21-24,
                  1997},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/259380.259405},
  doi          = {10.1145/259380.259405},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/Goldwasser97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR97-018,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Shai Halevi},
  title        = {Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR97-018}},
  year         = {1997},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/1997/TR97-018/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR97-018},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR97-018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR97-031,
  author       = {Oded Goldreich and
                  Shafi Goldwasser},
  title        = {On the Limits of Non-Approximability of Lattice Problems},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR97-031}},
  year         = {1997},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/1997/TR97-031/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR97-031},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR97-031.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/FeigeGLSS96,
  author       = {Uriel Feige and
                  Shafi Goldwasser and
                  L{\'{a}}szl{\'{o}} Lov{\'{a}}sz and
                  Shmuel Safra and
                  Mario Szegedy},
  title        = {Interactive Proofs and the Hardness of Approximating Cliques},
  journal      = {J. {ACM}},
  volume       = {43},
  number       = {2},
  pages        = {268--292},
  year         = {1996},
  url          = {https://doi.org/10.1145/226643.226652},
  doi          = {10.1145/226643.226652},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jacm/FeigeGLSS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GoldreichGR96,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Dana Ron},
  title        = {Property Testing and Its Connection to Learning and Approximation},
  booktitle    = {37th Annual Symposium on Foundations of Computer Science, {FOCS} '96,
                  Burlington, Vermont, USA, 14-16 October, 1996},
  pages        = {339--348},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/SFCS.1996.548493},
  doi          = {10.1109/SFCS.1996.548493},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GoldreichGR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR96-042,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Shai Halevi},
  title        = {Collision-Free Hashing from Lattice Problems},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR96-042}},
  year         = {1996},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/1996/TR96-042/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR96-042},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR96-042.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR96-056,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Shai Halevi},
  title        = {Public-Key Cryptosystems from Lattice Reduction Problems},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR96-056}},
  year         = {1996},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/1996/TR96-056/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR96-056},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR96-056.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR96-057,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Dana Ron},
  title        = {Property Testing and its connection to Learning and Approximation},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR96-057}},
  year         = {1996},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/1996/TR96-057/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR96-057},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR96-057.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldreichGH96,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Shai Halevi},
  title        = {Collision-Free Hashing from Lattice Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {1996},
  url          = {http://eprint.iacr.org/1996/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldreichGH96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareG96,
  author       = {Mihir Bellare and
                  Shafi Goldwasser},
  title        = {Verifiable Partial Key Escrow},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {1996},
  url          = {http://eprint.iacr.org/1996/015},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareG96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldreichGH96a,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Shai Halevi},
  title        = {Public-Key Cryptosystems from Lattice Reduction Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {1996},
  url          = {http://eprint.iacr.org/1996/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldreichGH96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/Goldwasser95,
  author       = {Shafi Goldwasser},
  editor       = {Friedbert Huber{-}W{\"{a}}schle and
                  Helmut Schauer and
                  Peter Widmayer},
  title        = {Probabilistically Checkable Proofs and Applications},
  booktitle    = {{GISI} 95, Herausforderungen eines globalen Informationsverbundes
                  f{\"{u}}r die Informatik, 25. GI-Jahrestagung und 13. Schweizer
                  Informatikertag, Z{\"{u}}rich, Schweiz, 18.-20. September 1995},
  series       = {Informatik Aktuell},
  pages        = {13--25},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/978-3-642-79958-7\_2},
  doi          = {10.1007/978-3-642-79958-7\_2},
  timestamp    = {Tue, 23 May 2017 01:10:34 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/Goldwasser95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BellareGG95,
  author       = {Mihir Bellare and
                  Oded Goldreich and
                  Shafi Goldwasser},
  editor       = {Frank Thomson Leighton and
                  Allan Borodin},
  title        = {Incremental cryptography and application to virus protection},
  booktitle    = {Proceedings of the Twenty-Seventh Annual {ACM} Symposium on Theory
                  of Computing, 29 May-1 June 1995, Las Vegas, Nevada, {USA}},
  pages        = {45--56},
  publisher    = {{ACM}},
  year         = {1995},
  url          = {https://doi.org/10.1145/225058.225080},
  doi          = {10.1145/225058.225080},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/BellareGG95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/BellareG94,
  author       = {Mihir Bellare and
                  Shafi Goldwasser},
  title        = {The Complexity of Decision Versus Search},
  journal      = {{SIAM} J. Comput.},
  volume       = {23},
  number       = {1},
  pages        = {97--119},
  year         = {1994},
  url          = {https://doi.org/10.1137/S0097539792228289},
  doi          = {10.1137/S0097539792228289},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/BellareG94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareGG94,
  author       = {Mihir Bellare and
                  Oded Goldreich and
                  Shafi Goldwasser},
  editor       = {Yvo Desmedt},
  title        = {Incremental Cryptography: The Case of Hashing and Signing},
  booktitle    = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {839},
  pages        = {216--233},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-48658-5\_22},
  doi          = {10.1007/3-540-48658-5\_22},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareGG94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BellareGLR94,
  author       = {Mihir Bellare and
                  Shafi Goldwasser and
                  Carsten Lund and
                  Alexander Russell},
  editor       = {Frank Thomson Leighton and
                  Michael T. Goodrich},
  title        = {Efficient probabilistic checkable proofs and applications to approximation},
  booktitle    = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Theory of
                  Computing, 23-25 May 1994, Montr{\'{e}}al, Qu{\'{e}}bec,
                  Canada},
  pages        = {820},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/195058.195467},
  doi          = {10.1145/195058.195467},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/BellareGLR94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cc/BellareGG93,
  author       = {Mihir Bellare and
                  Oded Goldreich and
                  Shafi Goldwasser},
  title        = {Randomness in Interactive Proofs},
  journal      = {Comput. Complex.},
  volume       = {3},
  pages        = {319--354},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF01275487},
  doi          = {10.1007/BF01275487},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cc/BellareGG93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/istcs/Goldwasser93,
  author       = {Shafi Goldwasser},
  title        = {Efficient Interactive Proofs and Applications to Approximation},
  booktitle    = {Second Israel Symposium on Theory of Computing Systems, {ISTCS} 1993,
                  Natanya, Israel, June 7-9, 1993, Proceedings},
  pages        = {1--2},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/istcs/Goldwasser93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BellareGLR93,
  author       = {Mihir Bellare and
                  Shafi Goldwasser and
                  Carsten Lund and
                  Alexander Russell},
  editor       = {S. Rao Kosaraju and
                  David S. Johnson and
                  Alok Aggarwal},
  title        = {Efficient probabilistically checkable proofs and applications to approximations},
  booktitle    = {Proceedings of the Twenty-Fifth Annual {ACM} Symposium on Theory of
                  Computing, May 16-18, 1993, San Diego, CA, {USA}},
  pages        = {294--304},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/167088.167174},
  doi          = {10.1145/167088.167174},
  timestamp    = {Sat, 27 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/BellareGLR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoldwasserO92,
  author       = {Shafi Goldwasser and
                  Rafail Ostrovsky},
  editor       = {Ernest F. Brickell},
  title        = {Invariant Signatures and Non-Interactive Zero-Knowledge Proofs are
                  Equivalent (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {740},
  pages        = {228--245},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-48071-4\_16},
  doi          = {10.1007/3-540-48071-4\_16},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoldwasserO92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/FeigeGLSS91,
  author       = {Uriel Feige and
                  Shafi Goldwasser and
                  L{\'{a}}szl{\'{o}} Lov{\'{a}}sz and
                  Shmuel Safra and
                  Mario Szegedy},
  title        = {Approximating Clique is Almost NP-Complete (Preliminary Version)},
  booktitle    = {32nd Annual Symposium on Foundations of Computer Science, San Juan,
                  Puerto Rico, 1-4 October 1991},
  pages        = {2--12},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/SFCS.1991.185341},
  doi          = {10.1109/SFCS.1991.185341},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/focs/FeigeGLSS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/BeigelBFG91,
  author       = {Richard Beigel and
                  Mihir Bellare and
                  Joan Feigenbaum and
                  Shafi Goldwasser},
  title        = {Languages that Are Easier than their Proofs},
  booktitle    = {32nd Annual Symposium on Foundations of Computer Science, San Juan,
                  Puerto Rico, 1-4 October 1991},
  pages        = {19--28},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/SFCS.1991.185343},
  doi          = {10.1109/SFCS.1991.185343},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/BeigelBFG91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GoldreichGL91,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Nathan Linial},
  title        = {Fault-tolerant Computation in the Full Information Model (Extended
                  Abstract)},
  booktitle    = {32nd Annual Symposium on Foundations of Computer Science, San Juan,
                  Puerto Rico, 1-4 October 1991},
  pages        = {447--457},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/SFCS.1991.185405},
  doi          = {10.1109/SFCS.1991.185405},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GoldreichGL91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/combinatorica/AielloGH90,
  author       = {William Aiello and
                  Shafi Goldwasser and
                  Johan H{\aa}stad},
  title        = {On the power of interaction},
  journal      = {Comb.},
  volume       = {10},
  number       = {1},
  pages        = {3--25},
  year         = {1990},
  url          = {https://doi.org/10.1007/BF02122692},
  doi          = {10.1007/BF02122692},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/combinatorica/AielloGH90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoldwasserL90,
  author       = {Shafi Goldwasser and
                  Leonid A. Levin},
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {Fair Computation of General Functions in Presence of Immoral Majority},
  booktitle    = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  pages        = {77--93},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-38424-3\_6},
  doi          = {10.1007/3-540-38424-3\_6},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoldwasserL90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/BellareGG90,
  author       = {Mihir Bellare and
                  Oded Goldreich and
                  Shafi Goldwasser},
  title        = {Randomness in Interactive Proofs},
  booktitle    = {31st Annual Symposium on Foundations of Computer Science, St. Louis,
                  Missouri, USA, October 22-24, 1990, Volume {II}},
  pages        = {563--572},
  publisher    = {{IEEE} Computer Society},
  year         = {1990},
  url          = {https://doi.org/10.1109/FSCS.1990.89577},
  doi          = {10.1109/FSCS.1990.89577},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/BellareGG90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/1988,
  editor       = {Shafi Goldwasser},
  title        = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/0-387-34799-2},
  doi          = {10.1007/0-387-34799-2},
  isbn         = {3-540-97196-3},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/1988.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/acr/GoldwasserS89,
  author       = {Shafi Goldwasser and
                  Michael Sipser},
  title        = {Private Coins versus Public Coins in Interactive Proof Systems},
  journal      = {Adv. Comput. Res.},
  volume       = {5},
  pages        = {73--90},
  year         = {1989},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/acr/GoldwasserS89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/GoldwasserMR89,
  author       = {Shafi Goldwasser and
                  Silvio Micali and
                  Charles Rackoff},
  title        = {The Knowledge Complexity of Interactive Proof Systems},
  journal      = {{SIAM} J. Comput.},
  volume       = {18},
  number       = {1},
  pages        = {186--208},
  year         = {1989},
  url          = {https://doi.org/10.1137/0218012},
  doi          = {10.1137/0218012},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/siamcomp/GoldwasserMR89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareG89,
  author       = {Mihir Bellare and
                  Shafi Goldwasser},
  editor       = {Gilles Brassard},
  title        = {New Paradigms for Digital Signatures and Message Authentication Based
                  on Non-Interative Zero Knowledge Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {194--211},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_19},
  doi          = {10.1007/0-387-34805-0\_19},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareG89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Ben-OrGKW89,
  author       = {Michael Ben{-}Or and
                  Shafi Goldwasser and
                  Joe Kilian and
                  Avi Wigderson},
  editor       = {Gilles Brassard},
  title        = {Efficient Identification Schemes Using Two Prover Interactive Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {498--506},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_44},
  doi          = {10.1007/0-387-34805-0\_44},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Ben-OrGKW89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeaverG89,
  author       = {Donald Beaver and
                  Shafi Goldwasser},
  editor       = {Gilles Brassard},
  title        = {Multiparty Computation with Faulty Majority},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {589--590},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_51},
  doi          = {10.1007/0-387-34805-0\_51},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BeaverG89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareCG89,
  author       = {Mihir Bellare and
                  Lenore Cowen and
                  Shafi Goldwasser},
  editor       = {Gilles Brassard},
  title        = {On the Structure of Secret Key Exchange Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {604--605},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_53},
  doi          = {10.1007/0-387-34805-0\_53},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareCG89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/BellareCG89,
  author       = {Mihir Bellare and
                  Lenore Cowen and
                  Shafi Goldwasser},
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {On the Structure of Secret Key Exchange Protocols},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {79--92},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  url          = {https://doi.org/10.1090/dimacs/002/04},
  doi          = {10.1090/DIMACS/002/04},
  timestamp    = {Mon, 22 May 2023 16:07:35 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/BellareCG89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/BeaverG89,
  author       = {Donald Beaver and
                  Shafi Goldwasser},
  title        = {Multiparty Computation with Faulty Majority (Extended Announcement)},
  booktitle    = {30th Annual Symposium on Foundations of Computer Science, Research
                  Triangle Park, North Carolina, USA, 30 October - 1 November 1989},
  pages        = {468--473},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/SFCS.1989.63520},
  doi          = {10.1109/SFCS.1989.63520},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/BeaverG89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/GoldwasserMR88,
  author       = {Shafi Goldwasser and
                  Silvio Micali and
                  Ronald L. Rivest},
  title        = {A Digital Signature Scheme Secure Against Adaptive Chosen-Message
                  Attacks},
  journal      = {{SIAM} J. Comput.},
  volume       = {17},
  number       = {2},
  pages        = {281--308},
  year         = {1988},
  url          = {https://doi.org/10.1137/0217017},
  doi          = {10.1137/0217017},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/siamcomp/GoldwasserMR88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Ben-OrGGHKMR88,
  author       = {Michael Ben{-}Or and
                  Oded Goldreich and
                  Shafi Goldwasser and
                  Johan H{\aa}stad and
                  Joe Kilian and
                  Silvio Micali and
                  Phillip Rogaway},
  editor       = {Shafi Goldwasser},
  title        = {Everything Provable is Provable in Zero-Knowledge},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {37--56},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_4},
  doi          = {10.1007/0-387-34799-2\_4},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Ben-OrGGHKMR88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/Ben-OrGW88,
  author       = {Michael Ben{-}Or and
                  Shafi Goldwasser and
                  Avi Wigderson},
  editor       = {Janos Simon},
  title        = {Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed
                  Computation (Extended Abstract)},
  booktitle    = {Proceedings of the 20th Annual {ACM} Symposium on Theory of Computing,
                  May 2-4, 1988, Chicago, Illinois, {USA}},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {1988},
  url          = {https://doi.org/10.1145/62212.62213},
  doi          = {10.1145/62212.62213},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/Ben-OrGW88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/Ben-OrGKW88,
  author       = {Michael Ben{-}Or and
                  Shafi Goldwasser and
                  Joe Kilian and
                  Avi Wigderson},
  editor       = {Janos Simon},
  title        = {Multi-Prover Interactive Proofs: How to Remove Intractability Assumptions},
  booktitle    = {Proceedings of the 20th Annual {ACM} Symposium on Theory of Computing,
                  May 2-4, 1988, Chicago, Illinois, {USA}},
  pages        = {113--131},
  publisher    = {{ACM}},
  year         = {1988},
  url          = {https://doi.org/10.1145/62212.62223},
  doi          = {10.1145/62212.62223},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/Ben-OrGKW88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/GoldreichGM86,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Silvio Micali},
  title        = {How to construct random functions},
  journal      = {J. {ACM}},
  volume       = {33},
  number       = {4},
  pages        = {792--807},
  year         = {1986},
  url          = {https://doi.org/10.1145/6490.6503},
  doi          = {10.1145/6490.6503},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/GoldreichGM86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/AielloGH86,
  author       = {William Aiello and
                  Shafi Goldwasser and
                  Johan H{\aa}stad},
  title        = {On the Power of Interaction},
  booktitle    = {27th Annual Symposium on Foundations of Computer Science, Toronto,
                  Canada, 27-29 October 1986},
  pages        = {368--379},
  publisher    = {{IEEE} Computer Society},
  year         = {1986},
  url          = {https://doi.org/10.1109/SFCS.1986.36},
  doi          = {10.1109/SFCS.1986.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/AielloGH86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GoldwasserS86,
  author       = {Shafi Goldwasser and
                  Michael Sipser},
  editor       = {Juris Hartmanis},
  title        = {Private Coins versus Public Coins in Interactive Proof Systems},
  booktitle    = {Proceedings of the 18th Annual {ACM} Symposium on Theory of Computing,
                  May 28-30, 1986, Berkeley, California, {USA}},
  pages        = {59--68},
  publisher    = {{ACM}},
  year         = {1986},
  url          = {https://doi.org/10.1145/12130.12137},
  doi          = {10.1145/12130.12137},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GoldwasserS86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GoldwasserK86,
  author       = {Shafi Goldwasser and
                  Joe Kilian},
  editor       = {Juris Hartmanis},
  title        = {Almost All Primes Can Be Quickly Certified},
  booktitle    = {Proceedings of the 18th Annual {ACM} Symposium on Theory of Computing,
                  May 28-30, 1986, Berkeley, California, {USA}},
  pages        = {316--329},
  publisher    = {{ACM}},
  year         = {1986},
  url          = {https://doi.org/10.1145/12130.12162},
  doi          = {10.1145/12130.12162},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GoldwasserK86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChorGG85,
  author       = {Benny Chor and
                  Oded Goldreich and
                  Shafi Goldwasser},
  editor       = {Hugh C. Williams},
  title        = {The Bit Security of Modular Squaring Given Partial Factorization of
                  the Modulos},
  booktitle    = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California,
                  USA, August 18-22, 1985, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {218},
  pages        = {448--457},
  publisher    = {Springer},
  year         = {1985},
  url          = {https://doi.org/10.1007/3-540-39799-X\_35},
  doi          = {10.1007/3-540-39799-X\_35},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChorGG85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/ChorGMA85,
  author       = {Benny Chor and
                  Shafi Goldwasser and
                  Silvio Micali and
                  Baruch Awerbuch},
  title        = {Verifiable Secret Sharing and Achieving Simultaneity in the Presence
                  of Faults (Extended Abstract)},
  booktitle    = {26th Annual Symposium on Foundations of Computer Science, Portland,
                  Oregon, USA, 21-23 October 1985},
  pages        = {383--395},
  publisher    = {{IEEE} Computer Society},
  year         = {1985},
  url          = {https://doi.org/10.1109/SFCS.1985.64},
  doi          = {10.1109/SFCS.1985.64},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/ChorGMA85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GoldwasserMR85,
  author       = {Shafi Goldwasser and
                  Silvio Micali and
                  Charles Rackoff},
  editor       = {Robert Sedgewick},
  title        = {The Knowledge Complexity of Interactive Proof-Systems (Extended Abstract)},
  booktitle    = {Proceedings of the 17th Annual {ACM} Symposium on Theory of Computing,
                  May 6-8, 1985, Providence, Rhode Island, {USA}},
  pages        = {291--304},
  publisher    = {{ACM}},
  year         = {1985},
  url          = {https://doi.org/10.1145/22145.22178},
  doi          = {10.1145/22145.22178},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GoldwasserMR85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/GoldwasserM84,
  author       = {Shafi Goldwasser and
                  Silvio Micali},
  title        = {Probabilistic Encryption},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {28},
  number       = {2},
  pages        = {270--299},
  year         = {1984},
  url          = {https://doi.org/10.1016/0022-0000(84)90070-9},
  doi          = {10.1016/0022-0000(84)90070-9},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/GoldwasserM84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoldreichGM84,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Silvio Micali},
  editor       = {G. R. Blakley and
                  David Chaum},
  title        = {On the Cryptographic Applications of Random Functions},
  booktitle    = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara,
                  California, USA, August 19-22, 1984, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {196},
  pages        = {276--288},
  publisher    = {Springer},
  year         = {1984},
  url          = {https://doi.org/10.1007/3-540-39568-7\_22},
  doi          = {10.1007/3-540-39568-7\_22},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoldreichGM84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlumG84,
  author       = {Manuel Blum and
                  Shafi Goldwasser},
  editor       = {G. R. Blakley and
                  David Chaum},
  title        = {An Efficient Probabilistic Public-Key Encryption Scheme Which Hides
                  All Partial Information},
  booktitle    = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara,
                  California, USA, August 19-22, 1984, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {196},
  pages        = {289--302},
  publisher    = {Springer},
  year         = {1984},
  url          = {https://doi.org/10.1007/3-540-39568-7\_23},
  doi          = {10.1007/3-540-39568-7\_23},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BlumG84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoldwasserMR84,
  author       = {Shafi Goldwasser and
                  Silvio Micali and
                  Ronald L. Rivest},
  editor       = {G. R. Blakley and
                  David Chaum},
  title        = {A "Paradoxical'"Solution to the Signature Problem (Abstract)},
  booktitle    = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara,
                  California, USA, August 19-22, 1984, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {196},
  pages        = {467},
  publisher    = {Springer},
  year         = {1984},
  url          = {https://doi.org/10.1007/3-540-39568-7\_37},
  doi          = {10.1007/3-540-39568-7\_37},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoldwasserMR84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GoldwasserMR84,
  author       = {Shafi Goldwasser and
                  Silvio Micali and
                  Ronald L. Rivest},
  title        = {A "Paradoxical" Solution to the Signature Problem (Extended
                  Abstract)},
  booktitle    = {25th Annual Symposium on Foundations of Computer Science, West Palm
                  Beach, Florida, USA, 24-26 October 1984},
  pages        = {441--448},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SFCS.1984.715946},
  doi          = {10.1109/SFCS.1984.715946},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GoldwasserMR84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GoldreichGM84,
  author       = {Oded Goldreich and
                  Shafi Goldwasser and
                  Silvio Micali},
  title        = {How to Construct Random Functions (Extended Abstract)},
  booktitle    = {25th Annual Symposium on Foundations of Computer Science, West Palm
                  Beach, Florida, USA, 24-26 October 1984},
  pages        = {464--479},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SFCS.1984.715949},
  doi          = {10.1109/SFCS.1984.715949},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GoldreichGM84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GoldwasserMY83,
  author       = {Shafi Goldwasser and
                  Silvio Micali and
                  Andrew Chi{-}Chih Yao},
  editor       = {David S. Johnson and
                  Ronald Fagin and
                  Michael L. Fredman and
                  David Harel and
                  Richard M. Karp and
                  Nancy A. Lynch and
                  Christos H. Papadimitriou and
                  Ronald L. Rivest and
                  Walter L. Ruzzo and
                  Joel I. Seiferas},
  title        = {Strong Signature Schemes},
  booktitle    = {Proceedings of the 15th Annual {ACM} Symposium on Theory of Computing,
                  25-27 April, 1983, Boston, Massachusetts, {USA}},
  pages        = {431--439},
  publisher    = {{ACM}},
  year         = {1983},
  url          = {https://doi.org/10.1145/800061.808774},
  doi          = {10.1145/800061.808774},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GoldwasserMY83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/YaoMG82,
  author       = {Shafi Goldwasser and
                  Silvio Micali and
                  Andrew Chi{-}Chih Yao},
  editor       = {David Chaum and
                  Ronald L. Rivest and
                  Alan T. Sherman},
  title        = {On Signatures and Authentication},
  booktitle    = {Advances in Cryptology: Proceedings of {CRYPTO} '82, Santa Barbara,
                  California, USA, August 23-25, 1982},
  pages        = {211--215},
  publisher    = {Plenum Press, New York},
  year         = {1982},
  url          = {https://doi.org/10.1007/978-1-4757-0602-4\_20},
  doi          = {10.1007/978-1-4757-0602-4\_20},
  timestamp    = {Thu, 25 Jul 2019 12:26:02 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/YaoMG82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GoldwasserMT82,
  author       = {Shafi Goldwasser and
                  Silvio Micali and
                  Po Tong},
  title        = {Why and How to Establish a Private Code on a Public Network (Extended
                  Abstract)},
  booktitle    = {23rd Annual Symposium on Foundations of Computer Science, Chicago,
                  Illinois, USA, 3-5 November 1982},
  pages        = {134--144},
  publisher    = {{IEEE} Computer Society},
  year         = {1982},
  url          = {https://doi.org/10.1109/SFCS.1982.100},
  doi          = {10.1109/SFCS.1982.100},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GoldwasserMT82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GoldwasserM82,
  author       = {Shafi Goldwasser and
                  Silvio Micali},
  editor       = {Harry R. Lewis and
                  Barbara B. Simons and
                  Walter A. Burkhard and
                  Lawrence H. Landweber},
  title        = {Probabilistic Encryption and How to Play Mental Poker Keeping Secret
                  All Partial Information},
  booktitle    = {Proceedings of the 14th Annual {ACM} Symposium on Theory of Computing,
                  May 5-7, 1982, San Francisco, California, {USA}},
  pages        = {365--377},
  publisher    = {{ACM}},
  year         = {1982},
  url          = {https://doi.org/10.1145/800070.802212},
  doi          = {10.1145/800070.802212},
  timestamp    = {Wed, 14 Nov 2018 10:51:38 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GoldwasserM82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics