Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Shafi Goldwasser
@inproceedings{DBLP:conf/nips/GoldwasserGKP23, author = {Shafi Goldwasser and David F. Gruber and Adam Tauman Kalai and Orr Paradise}, editor = {Alice Oh and Tristan Naumann and Amir Globerson and Kate Saenko and Moritz Hardt and Sergey Levine}, title = {A Theory of Unsupervised Translation Motivated by Understanding Animal Communication}, booktitle = {Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023}, year = {2023}, url = {http://papers.nips.cc/paper\_files/paper/2023/hash/7571c9d44179c7988178593c5b62a9b6-Abstract-Conference.html}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/GoldwasserGKP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GevaGPLRAGBDWMBBWPSLMVBG23, author = {Ravit Geva and Alexander Gusev and Yuriy Polyakov and Lior Liram and Oded Rosolio and Andreea Alexandru and Nicholas Genise and Marcelo Blatt and Zohar Duchin and Barliz Waissengrin and Dan Mirelman and Felix Bukstein and Deborah T. Blumenthal and Ido Wolf and Sharon Pelles{-}Avraham and Tali Schaffer and Lee A. Lavi and Daniele Micciancio and Vinod Vaikuntanathan and Ahmad Al Badawi and Shafi Goldwasser}, title = {Collaborative Privacy-Preserving Analysis of Oncological Data using Multiparty Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1203}, year = {2023}, url = {https://eprint.iacr.org/2023/1203}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GevaGPLRAGBDWMBBWPSLMVBG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cslaw/BitanCGW22, author = {Dor Bitan and Ran Canetti and Shafi Goldwasser and Rebecca Wexler}, editor = {Daniel J. Weitzner and Joan Feigenbaum and Christopher S. Yoo}, title = {Using Zero-Knowledge to Reconcile Law Enforcement Secrecy and Fair Trial Rights in Criminal Cases}, booktitle = {Proceedings of the 2022 Symposium on Computer Science and Law, {CSLAW} 2022, Washington DC, USA, November 1-2, 2022}, pages = {9--22}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3511265.3550452}, doi = {10.1145/3511265.3550452}, timestamp = {Thu, 03 Nov 2022 11:26:00 +0100}, biburl = {https://dblp.org/rec/conf/cslaw/BitanCGW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GoldwasserKVZ22, author = {Shafi Goldwasser and Michael P. Kim and Vinod Vaikuntanathan and Or Zamir}, title = {Planting Undetectable Backdoors in Machine Learning Models : [Extended Abstract]}, booktitle = {63rd {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS} 2022, Denver, CO, USA, October 31 - November 3, 2022}, pages = {931--942}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/FOCS54457.2022.00092}, doi = {10.1109/FOCS54457.2022.00092}, timestamp = {Sat, 31 Dec 2022 17:14:50 +0100}, biburl = {https://dblp.org/rec/conf/focs/GoldwasserKVZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/ColadangeloGV22, author = {Andrea Coladangelo and Shafi Goldwasser and Umesh V. Vazirani}, editor = {Stefano Leonardi and Anupam Gupta}, title = {Deniable encryption in a Quantum world}, booktitle = {{STOC} '22: 54th Annual {ACM} {SIGACT} Symposium on Theory of Computing, Rome, Italy, June 20 - 24, 2022}, pages = {1378--1391}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3519935.3520019}, doi = {10.1145/3519935.3520019}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/ColadangeloGV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-06974, author = {Shafi Goldwasser and Michael P. Kim and Vinod Vaikuntanathan and Or Zamir}, title = {Planting Undetectable Backdoors in Machine Learning Models}, journal = {CoRR}, volume = {abs/2204.06974}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.06974}, doi = {10.48550/ARXIV.2204.06974}, eprinttype = {arXiv}, eprint = {2204.06974}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-06974.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-11081, author = {Shafi Goldwasser and David F. Gruber and Adam Tauman Kalai and Orr Paradise}, title = {A Theory of Unsupervised Translation Motivated by Understanding Animal Communication}, journal = {CoRR}, volume = {abs/2211.11081}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.11081}, doi = {10.48550/ARXIV.2211.11081}, eprinttype = {arXiv}, eprint = {2211.11081}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-11081.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coco/GoldwasserIPS21, author = {Shafi Goldwasser and Russell Impagliazzo and Toniann Pitassi and Rahul Santhanam}, editor = {Valentine Kabanets}, title = {On the Pseudo-Deterministic Query Complexity of {NP} Search Problems}, booktitle = {36th Computational Complexity Conference, {CCC} 2021, July 20-23, 2021, Toronto, Ontario, Canada (Virtual Conference)}, series = {LIPIcs}, volume = {200}, pages = {36:1--36:22}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2021}, url = {https://doi.org/10.4230/LIPIcs.CCC.2021.36}, doi = {10.4230/LIPICS.CCC.2021.36}, timestamp = {Thu, 02 Feb 2023 13:27:03 +0100}, biburl = {https://dblp.org/rec/conf/coco/GoldwasserIPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalGM21, author = {Shweta Agrawal and Shafi Goldwasser and Saleet Mossel}, editor = {Tal Malkin and Chris Peikert}, title = {Deniable Fully Homomorphic Encryption from Learning with Errors}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {641--670}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_22}, doi = {10.1007/978-3-030-84245-1\_22}, timestamp = {Mon, 16 Aug 2021 09:08:14 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/GoldwasserRSY21, author = {Shafi Goldwasser and Guy N. Rothblum and Jonathan Shafer and Amir Yehudayoff}, editor = {James R. Lee}, title = {Interactive Proofs for Verifying Machine Learning}, booktitle = {12th Innovations in Theoretical Computer Science Conference, {ITCS} 2021, January 6-8, 2021, Virtual Conference}, series = {LIPIcs}, volume = {185}, pages = {41:1--41:19}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2021}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2021.41}, doi = {10.4230/LIPICS.ITCS.2021.41}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/GoldwasserRSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-08614, author = {Jacob Andreas and Gasper Begus and Michael M. Bronstein and Roee Diamant and Denley Delaney and Shane Gero and Shafi Goldwasser and David F. Gruber and Sarah de Haas and Peter Malkin and Roger Payne and Giovanni Petri and Daniela Rus and Pratyusha Sharma and Dan Tchernov and Pernille T{\o}nnesen and Antonio Torralba and Daniel M. Vogt and Robert J. Wood}, title = {Cetacean Translation Initiative: a roadmap to deciphering the communication of sperm whales}, journal = {CoRR}, volume = {abs/2104.08614}, year = {2021}, url = {https://arxiv.org/abs/2104.08614}, eprinttype = {arXiv}, eprint = {2104.08614}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-08614.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-14988, author = {Andrea Coladangelo and Shafi Goldwasser and Umesh V. Vazirani}, title = {Deniable Encryption in a Quantum World}, journal = {CoRR}, volume = {abs/2112.14988}, year = {2021}, url = {https://arxiv.org/abs/2112.14988}, eprinttype = {arXiv}, eprint = {2112.14988}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-14988.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargGV20, author = {Sanjam Garg and Shafi Goldwasser and Prashant Nalini Vasudevan}, editor = {Anne Canteaut and Yuval Ishai}, title = {Formalizing Data Deletion in the Context of the Right to Be Forgotten}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {373--402}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_13}, doi = {10.1007/978-3-030-45724-2\_13}, timestamp = {Mon, 04 May 2020 14:32:28 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargGV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/GoldwasserGMW20, author = {Shafi Goldwasser and Ofer Grossman and Sidhanth Mohanty and David P. Woodruff}, editor = {Thomas Vidick}, title = {Pseudo-Deterministic Streaming}, booktitle = {11th Innovations in Theoretical Computer Science Conference, {ITCS} 2020, January 12-14, 2020, Seattle, Washington, {USA}}, series = {LIPIcs}, volume = {151}, pages = {79:1--79:25}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2020.79}, doi = {10.4230/LIPICS.ITCS.2020.79}, timestamp = {Mon, 06 Jan 2020 16:50:09 +0100}, biburl = {https://dblp.org/rec/conf/innovations/GoldwasserGMW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ita/GoldwasserKKM20, author = {Shafi Goldwasser and Adam Tauman Kalai and Yael Tauman Kalai and Omar Montasser}, title = {Identifying unpredictable test examples with worst-case guarantees}, booktitle = {Information Theory and Applications Workshop, {ITA} 2020, San Diego, CA, USA, February 2-7, 2020}, pages = {1--14}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ITA50056.2020.9244996}, doi = {10.1109/ITA50056.2020.9244996}, timestamp = {Thu, 19 Nov 2020 14:03:02 +0100}, biburl = {https://dblp.org/rec/conf/ita/GoldwasserKKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/GoldwasserKKM20, author = {Shafi Goldwasser and Adam Tauman Kalai and Yael Kalai and Omar Montasser}, editor = {Hugo Larochelle and Marc'Aurelio Ranzato and Raia Hadsell and Maria{-}Florina Balcan and Hsuan{-}Tien Lin}, title = {Beyond Perturbations: Learning Guarantees with Arbitrary Adversarial Test Examples}, booktitle = {Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020, December 6-12, 2020, virtual}, year = {2020}, url = {https://proceedings.neurips.cc/paper/2020/hash/b6c8cf4c587f2ead0c08955ee6e2502b-Abstract.html}, timestamp = {Tue, 19 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/GoldwasserKKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-10635, author = {Sanjam Garg and Shafi Goldwasser and Prashant Nalini Vasudevan}, title = {Formalizing Data Deletion in the Context of the Right to be Forgotten}, journal = {CoRR}, volume = {abs/2002.10635}, year = {2020}, url = {https://arxiv.org/abs/2002.10635}, eprinttype = {arXiv}, eprint = {2002.10635}, timestamp = {Tue, 03 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-10635.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-05145, author = {Shafi Goldwasser and Adam Tauman Kalai and Yael Tauman Kalai and Omar Montasser}, title = {Beyond Perturbations: Learning Guarantees with Arbitrary Adversarial Test Examples}, journal = {CoRR}, volume = {abs/2007.05145}, year = {2020}, url = {https://arxiv.org/abs/2007.05145}, eprinttype = {arXiv}, eprint = {2007.05145}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-05145.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/GoldwasserRSY20, author = {Shafi Goldwasser and Guy N. Rothblum and Jonathan Shafer and Amir Yehudayoff}, title = {Interactive Proofs for Verifying Machine Learning}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR20-058}}, year = {2020}, url = {https://eccc.weizmann.ac.il/report/2020/058}, eprinttype = {ECCC}, eprint = {TR20-058}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/GoldwasserRSY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargGV20, author = {Sanjam Garg and Shafi Goldwasser and Prashant Nalini Vasudevan}, title = {Formalizing Data Deletion in the Context of the Right to be Forgotten}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {254}, year = {2020}, url = {https://eprint.iacr.org/2020/254}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargGV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlattGPG20, author = {Marcelo Blatt and Alexander Gusev and Yuriy Polyakov and Shafi Goldwasser}, title = {Secure large-scale genome-wide association studies using homomorphic encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {563}, year = {2020}, url = {https://eprint.iacr.org/2020/563}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlattGPG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalGM20a, author = {Shweta Agrawal and Shafi Goldwasser and Saleet Mossel}, title = {Deniable Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1588}, year = {2020}, url = {https://eprint.iacr.org/2020/1588}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalGM20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cslaw/Goldwasser19, author = {Shafi Goldwasser}, title = {What cryptography can bring to law: keynote presentation}, booktitle = {Symposium on Computer Science and Law, {CSLAW} 2019, New York, NY, USA, October 28-29, 2019}, pages = {1}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3379921.3379925}, doi = {10.1145/3379921.3379925}, timestamp = {Mon, 27 Jul 2020 16:05:24 +0200}, biburl = {https://dblp.org/rec/conf/cslaw/Goldwasser19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/ChenGLRR19, author = {Lijie Chen and Shafi Goldwasser and Kaifeng Lyu and Guy N. Rothblum and Aviad Rubinstein}, editor = {Timothy M. Chan}, title = {Fine-grained Complexity Meets {IP} = {PSPACE}}, booktitle = {Proceedings of the Thirtieth Annual {ACM-SIAM} Symposium on Discrete Algorithms, {SODA} 2019, San Diego, California, USA, January 6-9, 2019}, pages = {1--20}, publisher = {{SIAM}}, year = {2019}, url = {https://doi.org/10.1137/1.9781611975482.1}, doi = {10.1137/1.9781611975482.1}, timestamp = {Thu, 15 Jul 2021 13:49:01 +0200}, biburl = {https://dblp.org/rec/conf/soda/ChenGLRR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/acm/19/GoldwasserM19, author = {Shafi Goldwasser and Silvio Micali}, editor = {Oded Goldreich}, title = {Probabilistic encryption {\&} how to play mental poker keeping secret all partial information}, booktitle = {Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali}, pages = {173--201}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335741.3335749}, doi = {10.1145/3335741.3335749}, timestamp = {Tue, 05 Nov 2019 15:40:16 +0100}, biburl = {https://dblp.org/rec/books/acm/19/GoldwasserM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/acm/19/GoldwasserMR19, author = {Shafi Goldwasser and Silvio Micali and Charles Rackoff}, editor = {Oded Goldreich}, title = {The knowledge complexity of interactive proof-systems}, booktitle = {Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali}, pages = {203--225}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335741.3335750}, doi = {10.1145/3335741.3335750}, timestamp = {Tue, 05 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/acm/19/GoldwasserMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/acm/19/0001GM19, author = {Oded Goldreich and Shafi Goldwasser and Silvio Micali}, editor = {Oded Goldreich}, title = {How to construct random functions}, booktitle = {Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali}, pages = {241--264}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335741.3335752}, doi = {10.1145/3335741.3335752}, timestamp = {Tue, 05 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/acm/19/0001GM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/acm/19/GoldwasserMR19a, author = {Shafi Goldwasser and Silvio Micali and Ronald L. Rivest}, editor = {Oded Goldreich}, title = {A "paradoxical" solution to the signature problem}, booktitle = {Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali}, pages = {265--284}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335741.3335753}, doi = {10.1145/3335741.3335753}, timestamp = {Tue, 05 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/acm/19/GoldwasserMR19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/acm/19/Ben-OrGW19, author = {Michael Ben{-}Or and Shafi Goldwasser and Avi Wigderson}, editor = {Oded Goldreich}, title = {Completeness theorems for non-cryptographic fault-tolerant distributed computation}, booktitle = {Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali}, pages = {351--371}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335741.3335756}, doi = {10.1145/3335741.3335756}, timestamp = {Tue, 05 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/acm/19/Ben-OrGW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/acm/19/Ben-OrGKW19, author = {Michael Ben{-}Or and Shafi Goldwasser and Joe Kilian and Avi Wigderson}, editor = {Oded Goldreich}, title = {Multi-prover interactive proofs: how to remove intractability assumptions}, booktitle = {Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali}, pages = {373--410}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3335741.3335758}, doi = {10.1145/3335741.3335758}, timestamp = {Tue, 05 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/acm/19/Ben-OrGKW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-00994, author = {Michel X. Goemans and Shafi Goldwasser and Dhiraj Holden}, title = {Doubly-Efficient Pseudo-Deterministic Proofs}, journal = {CoRR}, volume = {abs/1910.00994}, year = {2019}, url = {http://arxiv.org/abs/1910.00994}, eprinttype = {arXiv}, eprint = {1910.00994}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-00994.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-11368, author = {Shafi Goldwasser and Ofer Grossman and Sidhanth Mohanty and David P. Woodruff}, title = {Pseudo-deterministic Streaming}, journal = {CoRR}, volume = {abs/1911.11368}, year = {2019}, url = {http://arxiv.org/abs/1911.11368}, eprinttype = {arXiv}, eprint = {1911.11368}, timestamp = {Tue, 03 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-11368.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/GoemansGH19, author = {Michel X. Goemans and Shafi Goldwasser and Dhiraj Holden}, title = {Doubly-Efficient Pseudo-Deterministic Proofs}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR19-135}}, year = {2019}, url = {https://eccc.weizmann.ac.il/report/2019/135}, eprinttype = {ECCC}, eprint = {TR19-135}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/GoemansGH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/GoldwasserGMW19, author = {Shafi Goldwasser and Ofer Grossman and Sidhanth Mohanty and David P. Woodruff}, title = {Pseudo-deterministic Streaming}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR19-177}}, year = {2019}, url = {https://eccc.weizmann.ac.il/report/2019/177}, eprinttype = {ECCC}, eprint = {TR19-177}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/GoldwasserGMW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtCCDGGHH19, author = {Martin R. Albrecht and Melissa Chase and Hao Chen and Jintai Ding and Shafi Goldwasser and Sergey Gorbunov and Shai Halevi and Jeffrey Hoffstein and Kim Laine and Kristin E. Lauter and Satya Lokam and Daniele Micciancio and Dustin Moody and Travis Morrison and Amit Sahai and Vinod Vaikuntanathan}, title = {Homomorphic Encryption Standard}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {939}, year = {2019}, url = {https://eprint.iacr.org/2019/939}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtCCDGGHH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/GoldwasserGH18, author = {Shafi Goldwasser and Ofer Grossman and Dhiraj Holden}, editor = {Anna R. Karlin}, title = {Pseudo-Deterministic Proofs}, booktitle = {9th Innovations in Theoretical Computer Science Conference, {ITCS} 2018, January 11-14, 2018, Cambridge, MA, {USA}}, series = {LIPIcs}, volume = {94}, pages = {17:1--17:18}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2018}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2018.17}, doi = {10.4230/LIPICS.ITCS.2018.17}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/innovations/GoldwasserGH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/GoldwasserOSS18, author = {Shafi Goldwasser and Rafail Ostrovsky and Alessandra Scafuro and Adam Sealfon}, editor = {Calvin Newport and Idit Keidar}, title = {Population Stability: Regulating Size in the Presence of an Adversary}, booktitle = {Proceedings of the 2018 {ACM} Symposium on Principles of Distributed Computing, {PODC} 2018, Egham, United Kingdom, July 23-27, 2018}, pages = {397--406}, publisher = {{ACM}}, year = {2018}, url = {https://dl.acm.org/citation.cfm?id=3212747}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/GoldwasserOSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FranklePSGW18, author = {Jonathan Frankle and Sunoo Park and Daniel Shaar and Shafi Goldwasser and Daniel J. Weitzner}, editor = {William Enck and Adrienne Porter Felt}, title = {Practical Accountability of Secret Processes}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {657--674}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/frankie}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/FranklePSGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-02540, author = {Shafi Goldwasser and Rafail Ostrovsky and Alessandra Scafuro and Adam Sealfon}, title = {Population stability: regulating size in the presence of an adversary}, journal = {CoRR}, volume = {abs/1803.02540}, year = {2018}, url = {http://arxiv.org/abs/1803.02540}, eprinttype = {arXiv}, eprint = {1803.02540}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-02540.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-02351, author = {Lijie Chen and Shafi Goldwasser and Kaifeng Lyu and Guy N. Rothblum and Aviad Rubinstein}, title = {Fine-grained Complexity Meets {IP} = {PSPACE}}, journal = {CoRR}, volume = {abs/1805.02351}, year = {2018}, url = {http://arxiv.org/abs/1805.02351}, eprinttype = {arXiv}, eprint = {1805.02351}, timestamp = {Fri, 05 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-02351.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserP18, author = {Shafi Goldwasser and Sunoo Park}, title = {Public Accountability vs. Secret Laws: Can They Coexist?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {664}, year = {2018}, url = {https://eprint.iacr.org/2018/664}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FranklePSGW18, author = {Jonathan Frankle and Sunoo Park and Daniel Shaar and Shafi Goldwasser and Daniel J. Weitzner}, title = {Practical Accountability of Secret Processes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {697}, year = {2018}, url = {https://eprint.iacr.org/2018/697}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FranklePSGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BitanskyCCGLRT17, author = {Nir Bitansky and Ran Canetti and Alessandro Chiesa and Shafi Goldwasser and Huijia Lin and Aviad Rubinstein and Eran Tromer}, title = {The Hunting of the {SNARK}}, journal = {J. Cryptol.}, volume = {30}, number = {4}, pages = {989--1066}, year = {2017}, url = {https://doi.org/10.1007/s00145-016-9241-9}, doi = {10.1007/S00145-016-9241-9}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BitanskyCCGLRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/GoldwasserG17, author = {Shafi Goldwasser and Ofer Grossman}, editor = {Ioannis Chatzigiannakis and Piotr Indyk and Fabian Kuhn and Anca Muscholl}, title = {Bipartite Perfect Matching in Pseudo-Deterministic {NC}}, booktitle = {44th International Colloquium on Automata, Languages, and Programming, {ICALP} 2017, July 10-14, 2017, Warsaw, Poland}, series = {LIPIcs}, volume = {80}, pages = {87:1--87:13}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2017}, url = {https://doi.org/10.4230/LIPIcs.ICALP.2017.87}, doi = {10.4230/LIPICS.ICALP.2017.87}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/icalp/GoldwasserG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/GoldwasserH17, author = {Shafi Goldwasser and Dhiraj Holden}, editor = {Christos H. Papadimitriou}, title = {The Complexity of Problems in {P} Given Correlated Instances}, booktitle = {8th Innovations in Theoretical Computer Science Conference, {ITCS} 2017, January 9-11, 2017, Berkeley, CA, {USA}}, series = {LIPIcs}, volume = {67}, pages = {13:1--13:19}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2017}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2017.13}, doi = {10.4230/LIPICS.ITCS.2017.13}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/innovations/GoldwasserH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/WangYGVZ17, author = {Frank Wang and Catherine Yun and Shafi Goldwasser and Vinod Vaikuntanathan and Matei Zaharia}, editor = {Aditya Akella and Jon Howell}, title = {Splinter: Practical Private Queries on Public Data}, booktitle = {14th {USENIX} Symposium on Networked Systems Design and Implementation, {NSDI} 2017, Boston, MA, USA, March 27-29, 2017}, pages = {299--313}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/nsdi17/technical-sessions/presentation/wang-frank}, timestamp = {Tue, 02 Feb 2021 08:05:04 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/WangYGVZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GoldwasserKW17, author = {Shafi Goldwasser and Saleet Klein and Daniel Wichs}, editor = {Yael Kalai and Leonid Reyzin}, title = {The Edited Truth}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {305--340}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_11}, doi = {10.1007/978-3-319-70500-2\_11}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GoldwasserKW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/GoldwasserP17, author = {Shafi Goldwasser and Sunoo Park}, editor = {Bhavani Thuraisingham and Adam J. Lee}, title = {Public Accountability vs. Secret Laws: Can They Coexist?: {A} Cryptographic Proposal}, booktitle = {Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30 - November 3, 2017}, pages = {99--110}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139550.3139565}, doi = {10.1145/3139550.3139565}, timestamp = {Wed, 29 Jun 2022 15:37:43 +0200}, biburl = {https://dblp.org/rec/conf/wpes/GoldwasserP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GoldwasserGH17, author = {Shafi Goldwasser and Ofer Grossman and Dhiraj Holden}, title = {Pseudo-deterministic Proofs}, journal = {CoRR}, volume = {abs/1706.04641}, year = {2017}, url = {http://arxiv.org/abs/1706.04641}, eprinttype = {arXiv}, eprint = {1706.04641}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GoldwasserGH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/GoldwasserGH17, author = {Shafi Goldwasser and Ofer Grossman and Dhiraj Holden}, title = {Pseudo-Deterministic Proofs}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR17-105}}, year = {2017}, url = {https://eccc.weizmann.ac.il/report/2017/105}, eprinttype = {ECCC}, eprint = {TR17-105}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/GoldwasserGH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/GoldwasserRK17, author = {Shafi Goldwasser and Guy N. Rothblum and Yael Tauman Kalai}, title = {Delegating Computation: Interactive Proofs for Muggles}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR17-108}}, year = {2017}, url = {https://eccc.weizmann.ac.il/report/2017/108}, eprinttype = {ECCC}, eprint = {TR17-108}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/GoldwasserRK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserKW17, author = {Shafi Goldwasser and Saleet Klein and Daniel Wichs}, title = {The Edited Truth}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {714}, year = {2017}, url = {http://eprint.iacr.org/2017/714}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserKW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/AzarGP16, author = {Pablo Daniel Azar and Shafi Goldwasser and Sunoo Park}, editor = {Madhu Sudan}, title = {How to Incentivize Data-Driven Collaboration Among Competing Parties}, booktitle = {Proceedings of the 2016 {ACM} Conference on Innovations in Theoretical Computer Science, Cambridge, MA, USA, January 14-16, 2016}, pages = {213--225}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2840728.2840758}, doi = {10.1145/2840728.2840758}, timestamp = {Tue, 14 Jun 2022 13:12:41 +0200}, biburl = {https://dblp.org/rec/conf/innovations/AzarGP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/BitanskyG0PVW16, author = {Nir Bitansky and Shafi Goldwasser and Abhishek Jain and Omer Paneth and Vinod Vaikuntanathan and Brent Waters}, editor = {Madhu Sudan}, title = {Time-Lock Puzzles from Randomized Encodings}, booktitle = {Proceedings of the 2016 {ACM} Conference on Innovations in Theoretical Computer Science, Cambridge, MA, USA, January 14-16, 2016}, pages = {345--356}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2840728.2840745}, doi = {10.1145/2840728.2840745}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/BitanskyG0PVW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GoldwasserK16, author = {Shafi Goldwasser and Yael Tauman Kalai}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Cryptographic Assumptions: {A} Position Paper}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9562}, pages = {505--522}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49096-9\_21}, doi = {10.1007/978-3-662-49096-9\_21}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GoldwasserK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/0002GP16, author = {Pablo Azar and Shafi Goldwasser and Sunoo Park}, title = {How to Incentivize Data-Driven Collaboration Among Competing Parties}, journal = {CoRR}, volume = {abs/1601.02298}, year = {2016}, url = {http://arxiv.org/abs/1601.02298}, eprinttype = {arXiv}, eprint = {1601.02298}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/0002GP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/GoldwasserH16, author = {Shafi Goldwasser and Dhiraj Holden}, title = {On the Fine Grained Complexity of Polynomial Time Problems Given Correlated Instances}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR16-056}}, year = {2016}, url = {https://eccc.weizmann.ac.il/report/2016/056}, eprinttype = {ECCC}, eprint = {TR16-056}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/GoldwasserH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangYGVZ16, author = {Frank Wang and Catherine Yun and Shafi Goldwasser and Vinod Vaikuntanathan and Matei Zaharia}, title = {Splinter: Practical Private Queries on Public Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1148}, year = {2016}, url = {http://eprint.iacr.org/2016/1148}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangYGVZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/GoldwasserKR15, author = {Shafi Goldwasser and Yael Tauman Kalai and Guy N. Rothblum}, title = {Delegating Computation: Interactive Proofs for Muggles}, journal = {J. {ACM}}, volume = {62}, number = {4}, pages = {27:1--27:64}, year = {2015}, url = {https://doi.org/10.1145/2699436}, doi = {10.1145/2699436}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jacm/GoldwasserKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/GoldwasserR15, author = {Shafi Goldwasser and Guy N. Rothblum}, title = {How to Compute in the Presence of Leakage}, journal = {{SIAM} J. Comput.}, volume = {44}, number = {5}, pages = {1480--1549}, year = {2015}, url = {https://doi.org/10.1137/130931461}, doi = {10.1137/130931461}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/GoldwasserR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/GoldwasserKP15, author = {Shafi Goldwasser and Yael Tauman Kalai and Sunoo Park}, editor = {Magn{\'{u}}s M. Halld{\'{o}}rsson and Kazuo Iwama and Naoki Kobayashi and Bettina Speckmann}, title = {Adaptively Secure Coin-Flipping, Revisited}, booktitle = {Automata, Languages, and Programming - 42nd International Colloquium, {ICALP} 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9135}, pages = {663--674}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47666-6\_53}, doi = {10.1007/978-3-662-47666-6\_53}, timestamp = {Fri, 27 Mar 2020 09:02:59 +0100}, biburl = {https://dblp.org/rec/conf/icalp/GoldwasserKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/ChandranCGGOZ15, author = {Nishanth Chandran and Wutichai Chongchitmate and Juan A. Garay and Shafi Goldwasser and Rafail Ostrovsky and Vassilis Zikas}, editor = {Tim Roughgarden}, title = {The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults}, booktitle = {Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, {ITCS} 2015, Rehovot, Israel, January 11-13, 2015}, pages = {153--162}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2688073.2688102}, doi = {10.1145/2688073.2688102}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/ChandranCGGOZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/DinurGL15, author = {Irit Dinur and Shafi Goldwasser and Huijia Lin}, editor = {Tim Roughgarden}, title = {The Computational Benefit of Correlated Instances}, booktitle = {Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, {ITCS} 2015, Rehovot, Israel, January 11-13, 2015}, pages = {219--228}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2688073.2688082}, doi = {10.1145/2688073.2688082}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/DinurGL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BostPTG15, author = {Raphael Bost and Raluca Ada Popa and Stephen Tu and Shafi Goldwasser}, title = {Machine Learning Classification over Encrypted Data}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/machine-learning-classification-over-encrypted-data}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BostPTG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CohenGV15, author = {Aloni Cohen and Shafi Goldwasser and Vinod Vaikuntanathan}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Aggregate Pseudorandom Functions and Connections to Learning}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9015}, pages = {61--89}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46497-7\_3}, doi = {10.1007/978-3-662-46497-7\_3}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CohenGV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CanettiGP15, author = {Ran Canetti and Shafi Goldwasser and Oxana Poburinnaya}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9015}, pages = {557--585}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46497-7\_22}, doi = {10.1007/978-3-662-46497-7\_22}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CanettiGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GoldwasserKP15, author = {Shafi Goldwasser and Yael Tauman Kalai and Sunoo Park}, title = {Adaptively Secure Coin-Flipping, Revisited}, journal = {CoRR}, volume = {abs/1503.01588}, year = {2015}, url = {http://arxiv.org/abs/1503.01588}, eprinttype = {arXiv}, eprint = {1503.01588}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GoldwasserKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/CohenGV15, author = {Aloni Cohen and Shafi Goldwasser and Vinod Vaikuntanathan}, title = {Aggregate Pseudorandom Functions and Connections to Learning}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR15-009}}, year = {2015}, url = {https://eccc.weizmann.ac.il/report/2015/009}, eprinttype = {ECCC}, eprint = {TR15-009}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/CohenGV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/GoldwasserG15, author = {Shafi Goldwasser and Ofer Grossman}, title = {Perfect Bipartite Matching in Pseudo-Deterministic {RNC}}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR15-208}}, year = {2015}, url = {https://eccc.weizmann.ac.il/report/2015/208}, eprinttype = {ECCC}, eprint = {TR15-208}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/GoldwasserG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenGV15, author = {Aloni Cohen and Shafi Goldwasser and Vinod Vaikuntanathan}, title = {Aggregatable Pseudorandom Functions and Connections to Learning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {38}, year = {2015}, url = {http://eprint.iacr.org/2015/038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohenGV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AzarGP15, author = {Pablo Azar and Shafi Goldwasser and Sunoo Park}, title = {How to Incentivize Data-Driven Collaboration Among Competing Parties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {178}, year = {2015}, url = {http://eprint.iacr.org/2015/178}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AzarGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserKP15, author = {Shafi Goldwasser and Yael Tauman Kalai and Sunoo Park}, title = {Adaptively Secure Coin-Flipping, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {202}, year = {2015}, url = {http://eprint.iacr.org/2015/202}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyG0PVW15, author = {Nir Bitansky and Shafi Goldwasser and Abhishek Jain and Omer Paneth and Vinod Vaikuntanathan and Brent Waters}, title = {Time-Lock Puzzles from Randomized Encodings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {514}, year = {2015}, url = {http://eprint.iacr.org/2015/514}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyG0PVW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserK15, author = {Shafi Goldwasser and Yael Tauman Kalai}, title = {Cryptographic Assumptions: {A} Position Paper}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {907}, year = {2015}, url = {http://eprint.iacr.org/2015/907}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/BoyleGK14, author = {Elette Boyle and Shafi Goldwasser and Yael Tauman Kalai}, title = {Leakage-resilient coin tossing}, journal = {Distributed Comput.}, volume = {27}, number = {3}, pages = {147--164}, year = {2014}, url = {https://doi.org/10.1007/s00446-013-0206-z}, doi = {10.1007/S00446-013-0206-Z}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/BoyleGK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GoldwasserR14, author = {Shafi Goldwasser and Guy N. Rothblum}, title = {On Best-Possible Obfuscation}, journal = {J. Cryptol.}, volume = {27}, number = {3}, pages = {480--505}, year = {2014}, url = {https://doi.org/10.1007/s00145-013-9151-z}, doi = {10.1007/S00145-013-9151-Z}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GoldwasserR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toct/AllenderG14, author = {Eric Allender and Shafi Goldwasser}, title = {Introduction to the Special Issue on Innovations in Theoretical Computer Science 2012 - Part {II}}, journal = {{ACM} Trans. Comput. Theory}, volume = {6}, number = {3}, pages = {10:1}, year = {2014}, url = {https://doi.org/10.1145/2638595}, doi = {10.1145/2638595}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toct/AllenderG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BitanskyCCGKPR14, author = {Nir Bitansky and Ran Canetti and Henry Cohn and Shafi Goldwasser and Yael Tauman Kalai and Omer Paneth and Alon Rosen}, editor = {Juan A. Garay and Rosario Gennaro}, title = {The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {71--89}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_5}, doi = {10.1007/978-3-662-44381-1\_5}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BitanskyCCGKPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GoldwasserGG0KLSSZ14, author = {Shafi Goldwasser and S. Dov Gordon and Vipul Goyal and Abhishek Jain and Jonathan Katz and Feng{-}Hao Liu and Amit Sahai and Elaine Shi and Hong{-}Sheng Zhou}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Multi-input Functional Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {578--602}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_32}, doi = {10.1007/978-3-642-55220-5\_32}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GoldwasserGG0KLSSZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BoyleGI14, author = {Elette Boyle and Shafi Goldwasser and Ioana Ivan}, editor = {Hugo Krawczyk}, title = {Functional Signatures and Pseudorandom Functions}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {501--519}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_29}, doi = {10.1007/978-3-642-54631-0\_29}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BoyleGI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CohnGK14, author = {Henry Cohn and Shafi Goldwasser and Yael Tauman Kalai}, title = {The impossibility of obfuscation with a universal simulator}, journal = {CoRR}, volume = {abs/1401.0348}, year = {2014}, url = {http://arxiv.org/abs/1401.0348}, eprinttype = {arXiv}, eprint = {1401.0348}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CohnGK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/DinurGL14, author = {Irit Dinur and Shafi Goldwasser and Huijia Lin}, title = {The Computational Benefit of Correlated Instances}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR14-083}}, year = {2014}, url = {https://eccc.weizmann.ac.il/report/2014/083}, eprinttype = {ECCC}, eprint = {TR14-083}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/DinurGL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BostPTG14, author = {Raphael Bost and Raluca Ada Popa and Stephen Tu and Shafi Goldwasser}, title = {Machine Learning Classification over Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {331}, year = {2014}, url = {http://eprint.iacr.org/2014/331}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BostPTG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyCCGLRT14, author = {Nir Bitansky and Ran Canetti and Alessandro Chiesa and Shafi Goldwasser and Huijia Lin and Aviad Rubinstein and Eran Tromer}, title = {The Hunting of the {SNARK}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {580}, year = {2014}, url = {http://eprint.iacr.org/2014/580}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyCCGLRT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranCGGOZ14, author = {Nishanth Chandran and Wutichai Chongchitmate and Juan A. Garay and Shafi Goldwasser and Rafail Ostrovsky and Vassilis Zikas}, title = {Optimally Resilient and Adaptively Secure Multi-Party Computation with Low Communication Locality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {615}, year = {2014}, url = {http://eprint.iacr.org/2014/615}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandranCGGOZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiGP14, author = {Ran Canetti and Shafi Goldwasser and Oxana Poburinnaya}, title = {Adaptively Secure Two-party Computation From Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {845}, year = {2014}, url = {http://eprint.iacr.org/2014/845}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiGP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toct/AllenderG13, author = {Eric Allender and Shafi Goldwasser}, title = {Introduction to the special issue on innovations in theoretical computer science 2012}, journal = {{ACM} Trans. Comput. Theory}, volume = {5}, number = {3}, pages = {8:1}, year = {2013}, url = {https://doi.org/10.1145/2493252.2493253}, doi = {10.1145/2493252.2493253}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toct/AllenderG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoldwasserKPVZ13, author = {Shafi Goldwasser and Yael Tauman Kalai and Raluca A. Popa and Vinod Vaikuntanathan and Nickolai Zeldovich}, editor = {Ran Canetti and Juan A. Garay}, title = {How to Run Turing Machines on Encrypted Data}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {536--553}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_30}, doi = {10.1007/978-3-642-40084-1\_30}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoldwasserKPVZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/GoldreichGR13, author = {Oded Goldreich and Shafi Goldwasser and Dana Ron}, editor = {Robert D. Kleinberg}, title = {On the possibilities and limitations of pseudodeterministic algorithms}, booktitle = {Innovations in Theoretical Computer Science, {ITCS} '13, Berkeley, CA, USA, January 9-12, 2013}, pages = {127--138}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2422436.2422453}, doi = {10.1145/2422436.2422453}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/GoldreichGR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GoldwasserKPVZ13, author = {Shafi Goldwasser and Yael Tauman Kalai and Raluca A. Popa and Vinod Vaikuntanathan and Nickolai Zeldovich}, editor = {Dan Boneh and Tim Roughgarden and Joan Feigenbaum}, title = {Reusable garbled circuits and succinct functional encryption}, booktitle = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA, USA, June 1-4, 2013}, pages = {555--564}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2488608.2488678}, doi = {10.1145/2488608.2488678}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GoldwasserKPVZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BoyleGT13, author = {Elette Boyle and Shafi Goldwasser and Stefano Tessaro}, editor = {Amit Sahai}, title = {Communication Locality in Secure Multi-party Computation - How to Run Sublinear Algorithms in a Distributed Setting}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {356--376}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_21}, doi = {10.1007/978-3-642-36594-2\_21}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BoyleGT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserKPVZ13, author = {Shafi Goldwasser and Yael Tauman Kalai and Raluca A. Popa and Vinod Vaikuntanathan and Nickolai Zeldovich}, title = {Overcoming the Worst-Case Curse for Cryptographic Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {229}, year = {2013}, url = {http://eprint.iacr.org/2013/229}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserKPVZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleGI13, author = {Elette Boyle and Shafi Goldwasser and Ioana Ivan}, title = {Functional Signatures and Pseudorandom Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {401}, year = {2013}, url = {http://eprint.iacr.org/2013/401}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleGI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserK13, author = {Shafi Goldwasser and Yael Tauman Kalai}, title = {A Note on the Impossibility of Obfuscation with Auxiliary Input}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {665}, year = {2013}, url = {http://eprint.iacr.org/2013/665}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserG0S13, author = {Shafi Goldwasser and Vipul Goyal and Abhishek Jain and Amit Sahai}, title = {Multi-Input Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {727}, year = {2013}, url = {http://eprint.iacr.org/2013/727}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserG0S13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GoldwasserR12, author = {Shafi Goldwasser and Guy N. Rothblum}, title = {How to Compute in the Presence of Leakage}, booktitle = {53rd Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2012, New Brunswick, NJ, USA, October 20-23, 2012}, pages = {31--40}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/FOCS.2012.34}, doi = {10.1109/FOCS.2012.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GoldwasserR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/AkaviaGH12, author = {Adi Akavia and Shafi Goldwasser and Carmit Hazay}, editor = {Darek Kowalski and Alessandro Panconesi}, title = {Distributed public key schemes secure against continual leakage}, booktitle = {{ACM} Symposium on Principles of Distributed Computing, {PODC} '12, Funchal, Madeira, Portugal, July 16-18, 2012}, pages = {155--164}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2332432.2332462}, doi = {10.1145/2332432.2332462}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/AkaviaGH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/Goldwasser12, author = {Shafi Goldwasser}, editor = {Christoph D{\"{u}}rr and Thomas Wilke}, title = {Pseudo-deterministic Algorithms (Invited Talk)}, booktitle = {29th International Symposium on Theoretical Aspects of Computer Science, {STACS} 2012, February 29th - March 3rd, 2012, Paris, France}, series = {LIPIcs}, volume = {14}, pages = {29--29}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2012}, url = {https://doi.org/10.4230/LIPIcs.STACS.2012.29}, doi = {10.4230/LIPICS.STACS.2012.29}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/stacs/Goldwasser12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BoyleGJK12, author = {Elette Boyle and Shafi Goldwasser and Abhishek Jain and Yael Tauman Kalai}, editor = {Howard J. Karloff and Toniann Pitassi}, title = {Multiparty computation secure against continual memory leakage}, booktitle = {Proceedings of the 44th Symposium on Theory of Computing Conference, {STOC} 2012, New York, NY, USA, May 19 - 22, 2012}, pages = {1235--1254}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2213977.2214087}, doi = {10.1145/2213977.2214087}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/BoyleGJK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GoldwasserLW12, author = {Shafi Goldwasser and Allison B. Lewko and David A. Wilson}, editor = {Ronald Cramer}, title = {Bounded-Collusion {IBE} from Key Homomorphism}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {564--581}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_32}, doi = {10.1007/978-3-642-28914-9\_32}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GoldwasserLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/innovations/2012, editor = {Shafi Goldwasser}, title = {Innovations in Theoretical Computer Science 2012, Cambridge, MA, USA, January 8-10, 2012}, publisher = {{ACM}}, year = {2012}, isbn = {978-1-4503-1115-1}, timestamp = {Sat, 24 Mar 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/GoldreichGR12, author = {Oded Goldreich and Shafi Goldwasser and Dana Ron}, title = {On the possibilities and limitations of pseudodeterministic algorithms}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR12-101}}, year = {2012}, url = {https://eccc.weizmann.ac.il/report/2012/101}, eprinttype = {ECCC}, eprint = {TR12-101}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/GoldreichGR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/GoldwasserR12, author = {Shafi Goldwasser and Guy N. Rothblum}, title = {How to Compute in the Presence of Leakage}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR12-010}}, year = {2012}, url = {https://eccc.weizmann.ac.il/report/2012/010}, eprinttype = {ECCC}, eprint = {TR12-010}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/GoldwasserR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserKPVZ12, author = {Shafi Goldwasser and Yael Tauman Kalai and Raluca A. Popa and Vinod Vaikuntanathan and Nickolai Zeldovich}, title = {Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {733}, year = {2012}, url = {http://eprint.iacr.org/2012/733}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserKPVZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BitanskyCGHKR11, author = {Nir Bitansky and Ran Canetti and Shafi Goldwasser and Shai Halevi and Yael Tauman Kalai and Guy N. Rothblum}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {Program Obfuscation with Leaky Hardware}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {722--739}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_39}, doi = {10.1007/978-3-642-25385-0\_39}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BitanskyCGHKR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BrakerskiGK11, author = {Zvika Brakerski and Shafi Goldwasser and Yael Tauman Kalai}, editor = {Yuval Ishai}, title = {Black-Box Circular-Secure Encryption beyond Affine Functions}, booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {201--218}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6\_13}, doi = {10.1007/978-3-642-19571-6\_13}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BrakerskiGK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/BoyleGK11, author = {Elette Boyle and Shafi Goldwasser and Yael Tauman Kalai}, editor = {David Peleg}, title = {Leakage-Resilient Coin Tossing}, booktitle = {Distributed Computing - 25th International Symposium, {DISC} 2011, Rome, Italy, September 20-22, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6950}, pages = {181--196}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24100-0\_16}, doi = {10.1007/978-3-642-24100-0\_16}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wdag/BoyleGK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/goldreich2011/GoldreichGH11, author = {Oded Goldreich and Shafi Goldwasser and Shai Halevi}, editor = {Oded Goldreich}, title = {Collision-Free Hashing from Lattice Problems}, booktitle = {Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation - In Collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman}, series = {Lecture Notes in Computer Science}, volume = {6650}, pages = {30--39}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22670-0\_5}, doi = {10.1007/978-3-642-22670-0\_5}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/books/sp/goldreich2011/GoldreichGH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/GatG11, author = {Eran Gat and Shafi Goldwasser}, title = {Probabilistic Search Algorithms with Unique Answers and Their Cryptographic Applications}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR11-136}}, year = {2011}, url = {https://eccc.weizmann.ac.il/report/2011/136}, eprinttype = {ECCC}, eprint = {TR11-136}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/GatG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleGK11, author = {Elette Boyle and Shafi Goldwasser and Yael Tauman Kalai}, title = {Leakage-Resilient Coin Tossing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {291}, year = {2011}, url = {http://eprint.iacr.org/2011/291}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyleGK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserLR11, author = {Shafi Goldwasser and Huijia Lin and Aviad Rubinstein}, title = {Delegation of Computation without Rejection Problem from Designated Verifier CS-Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {456}, year = {2011}, url = {http://eprint.iacr.org/2011/456}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserLR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyCGHKR11, author = {Nir Bitansky and Ran Canetti and Shafi Goldwasser and Shai Halevi and Yael Tauman Kalai and Guy N. Rothblum}, title = {Program Obfuscation with Leaky Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {660}, year = {2011}, url = {http://eprint.iacr.org/2011/660}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyCGHKR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/GoldreichGN10, author = {Oded Goldreich and Shafi Goldwasser and Asaf Nussboim}, title = {On the Implementation of Huge Random Objects}, journal = {{SIAM} J. Comput.}, volume = {39}, number = {7}, pages = {2761--2822}, year = {2010}, url = {https://doi.org/10.1137/080722771}, doi = {10.1137/080722771}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/siamcomp/GoldreichGN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrakerskiG10, author = {Zvika Brakerski and Shafi Goldwasser}, editor = {Tal Rabin}, title = {Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability - (or: Quadratic Residuosity Strikes Back)}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {1--20}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_1}, doi = {10.1007/978-3-642-14623-7\_1}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrakerskiG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoldwasserR10, author = {Shafi Goldwasser and Guy N. Rothblum}, editor = {Tal Rabin}, title = {Securing Computation against Continuous Leakage}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {59--79}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_4}, doi = {10.1007/978-3-642-14623-7\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoldwasserR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/GoldwasserKPV10, author = {Shafi Goldwasser and Yael Tauman Kalai and Chris Peikert and Vinod Vaikuntanathan}, editor = {Andrew Chi{-}Chih Yao}, title = {Robustness of the Learning with Errors Assumption}, booktitle = {Innovations in Computer Science - {ICS} 2010, Tsinghua University, Beijing, China, January 5-7, 2010. Proceedings}, pages = {230--240}, publisher = {Tsinghua University Press}, year = {2010}, url = {http://conference.iiis.tsinghua.edu.cn/ICS2010/content/papers/19.html}, timestamp = {Wed, 04 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/GoldwasserKPV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/AkaviaGGM10, author = {Adi Akavia and Oded Goldreich and Shafi Goldwasser and Dana Moshkovitz}, editor = {Leonard J. Schulman}, title = {Erratum for: on basing one-way functions on NP-hardness}, booktitle = {Proceedings of the 42nd {ACM} Symposium on Theory of Computing, {STOC} 2010, Cambridge, Massachusetts, USA, 5-8 June 2010}, pages = {795--796}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1806689.1806798}, doi = {10.1145/1806689.1806798}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/AkaviaGGM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisGKPV10, author = {Yevgeniy Dodis and Shafi Goldwasser and Yael Tauman Kalai and Chris Peikert and Vinod Vaikuntanathan}, editor = {Daniele Micciancio}, title = {Public-Key Encryption Schemes with Auxiliary Inputs}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {361--381}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_22}, doi = {10.1007/978-3-642-11799-2\_22}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DodisGKPV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiG10, author = {Zvika Brakerski and Shafi Goldwasser}, title = {Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {226}, year = {2010}, url = {http://eprint.iacr.org/2010/226}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Goldwasser09, author = {Shafi Goldwasser}, editor = {Antoine Joux}, title = {Cryptography without (Hardly Any) Secrets ?}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {369--370}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_21}, doi = {10.1007/978-3-642-01001-9\_21}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Goldwasser09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/Goldwasser09, author = {Shafi Goldwasser}, editor = {Michael Mitzenmacher}, title = {Athena lecture: Controlling Access to Programs?}, booktitle = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing, {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009}, pages = {167--168}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1536414.1536416}, doi = {10.1145/1536414.1536416}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/Goldwasser09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AkaviaGV09, author = {Adi Akavia and Shafi Goldwasser and Vinod Vaikuntanathan}, editor = {Omer Reingold}, title = {Simultaneous Hardcore Bits and Cryptography against Memory Attacks}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {474--495}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_28}, doi = {10.1007/978-3-642-00457-5\_28}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AkaviaGV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BrakerskiGRV09, author = {Zvika Brakerski and Shafi Goldwasser and Guy N. Rothblum and Vinod Vaikuntanathan}, editor = {Omer Reingold}, title = {Weak Verifiable Random Functions}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {558--576}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_33}, doi = {10.1007/978-3-642-00457-5\_33}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BrakerskiGRV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiGK09, author = {Zvika Brakerski and Shafi Goldwasser and Yael Tauman Kalai}, title = {Black-Box Circular-Secure Encryption Beyond Affine Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {485}, year = {2009}, url = {http://eprint.iacr.org/2009/485}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiGK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoldwasserKR08, author = {Shafi Goldwasser and Yael Tauman Kalai and Guy N. Rothblum}, editor = {David A. Wagner}, title = {One-Time Programs}, booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5157}, pages = {39--56}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85174-5\_3}, doi = {10.1007/978-3-540-85174-5\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoldwasserKR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Goldwasser08, author = {Shafi Goldwasser}, editor = {Tal Malkin}, title = {Program Obfuscation and One-Time Programs}, booktitle = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4964}, pages = {333--334}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79263-5\_21}, doi = {10.1007/978-3-540-79263-5\_21}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Goldwasser08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/CanettiEGL08, author = {Ran Canetti and Dror Eiger and Shafi Goldwasser and Dah{-}Yoh Lim}, editor = {Luca Aceto and Ivan Damg{\aa}rd and Leslie Ann Goldberg and Magn{\'{u}}s M. Halld{\'{o}}rsson and Anna Ing{\'{o}}lfsd{\'{o}}ttir and Igor Walukiewicz}, title = {How to Protect Yourself without Perfect Shredding}, booktitle = {Automata, Languages and Programming, 35th International Colloquium, {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&} Track {C:} Security and Cryptography Foundations}, series = {Lecture Notes in Computer Science}, volume = {5126}, pages = {511--523}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70583-3\_42}, doi = {10.1007/978-3-540-70583-3\_42}, timestamp = {Fri, 27 Mar 2020 09:02:59 +0100}, biburl = {https://dblp.org/rec/conf/icalp/CanettiEGL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GoldwasserKR08, author = {Shafi Goldwasser and Yael Tauman Kalai and Guy N. Rothblum}, editor = {Cynthia Dwork}, title = {Delegating computation: interactive proofs for muggles}, booktitle = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17-20, 2008}, pages = {113--122}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1374376.1374396}, doi = {10.1145/1374376.1374396}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GoldwasserKR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GoldwasserGHKR08, author = {Shafi Goldwasser and Dan Gutfreund and Alexander Healy and Tali Kaufman and Guy N. Rothblum}, editor = {Cynthia Dwork}, title = {A (de)constructive approach to program checking}, booktitle = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17-20, 2008}, pages = {143--152}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1374376.1374399}, doi = {10.1145/1374376.1374399}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GoldwasserGHKR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2008P8491, editor = {Ran Canetti and Shafi Goldwasser and G{\"{u}}nter M{\"{u}}ller and Rainer Steinwandt}, title = {Theoretical Foundations of Practical Information Security, 30.11. - 05.12.2008}, series = {Dagstuhl Seminar Proceedings}, volume = {08491}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/portals/08491/}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/2008P8491.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/CanettiGMS08, author = {Ran Canetti and Shafi Goldwasser and G{\"{u}}nter M{\"{u}}ller and Rainer Steinwandt}, editor = {Ran Canetti and Shafi Goldwasser and G{\"{u}}nter M{\"{u}}ller and Rainer Steinwandt}, title = {08491 Abstracts Collection - Theoretical Foundations of Practical Information Security}, booktitle = {Theoretical Foundations of Practical Information Security, 30.11. - 05.12.2008}, series = {Dagstuhl Seminar Proceedings}, volume = {08491}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1894/}, timestamp = {Thu, 10 Jun 2021 13:02:08 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/CanettiGMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/CanettiGMS08a, author = {Ran Canetti and Shafi Goldwasser and G{\"{u}}nter M{\"{u}}ller and Rainer Steinwandt}, editor = {Ran Canetti and Shafi Goldwasser and G{\"{u}}nter M{\"{u}}ller and Rainer Steinwandt}, title = {08491 Executive Summary - Theoretical Foundations of Practical Information Security}, booktitle = {Theoretical Foundations of Practical Information Security, 30.11. - 05.12.2008}, series = {Dagstuhl Seminar Proceedings}, volume = {08491}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2008}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1893/}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/CanettiGMS08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiEGL08, author = {Ran Canetti and Dror Eiger and Shafi Goldwasser and Dah{-}Yoh Lim}, title = {How to Protect Yourself without Perfect Shredding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {291}, year = {2008}, url = {http://eprint.iacr.org/2008/291}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiEGL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChenCGHV07, author = {Hao Chen and Ronald Cramer and Shafi Goldwasser and Robbert de Haan and Vinod Vaikuntanathan}, editor = {Moni Naor}, title = {Secure Computation from Random Error Correcting Codes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4515}, pages = {291--310}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72540-4\_17}, doi = {10.1007/978-3-540-72540-4\_17}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChenCGHV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GoldwasserGHKR07, author = {Shafi Goldwasser and Dan Gutfreund and Alexander Healy and Tali Kaufman and Guy N. Rothblum}, editor = {David S. Johnson and Uriel Feige}, title = {Verifying and decoding in constant depth}, booktitle = {Proceedings of the 39th Annual {ACM} Symposium on Theory of Computing, San Diego, California, USA, June 11-13, 2007}, pages = {440--449}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1250790.1250855}, doi = {10.1145/1250790.1250855}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GoldwasserGHKR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GoldwasserR07, author = {Shafi Goldwasser and Guy N. Rothblum}, editor = {Salil P. Vadhan}, title = {On Best-Possible Obfuscation}, booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC} 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4392}, pages = {194--213}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-70936-7\_11}, doi = {10.1007/978-3-540-70936-7\_11}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GoldwasserR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/GoldwasserGHKR07, author = {Shafi Goldwasser and Dan Gutfreund and Alexander Healy and Tali Kaufman and Guy N. Rothblum}, title = {A (De)constructive Approach to Program Checking}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR07-047}}, year = {2007}, url = {https://eccc.weizmann.ac.il/eccc-reports/2007/TR07-047/index.html}, eprinttype = {ECCC}, eprint = {TR07-047}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/GoldwasserGHKR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GoldwasserPV06, author = {Shafi Goldwasser and Elan Pavlov and Vinod Vaikuntanathan}, title = {Fault-Tolerant Distributed Computing in Full-Information Networks}, booktitle = {47th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS} 2006), 21-24 October 2006, Berkeley, California, USA, Proceedings}, pages = {15--26}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/FOCS.2006.30}, doi = {10.1109/FOCS.2006.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GoldwasserPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/AkaviaGGM06, author = {Adi Akavia and Oded Goldreich and Shafi Goldwasser and Dana Moshkovitz}, editor = {Jon M. Kleinberg}, title = {On basing one-way functions on NP-hardness}, booktitle = {Proceedings of the 38th Annual {ACM} Symposium on Theory of Computing, Seattle, WA, USA, May 21-23, 2006}, pages = {701--710}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1132516.1132614}, doi = {10.1145/1132516.1132614}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/AkaviaGGM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GoldwasserL05, author = {Shafi Goldwasser and Yehuda Lindell}, title = {Secure Multi-Party Computation without Agreement}, journal = {J. Cryptol.}, volume = {18}, number = {3}, pages = {247--287}, year = {2005}, url = {https://doi.org/10.1007/s00145-005-0319-z}, doi = {10.1007/S00145-005-0319-Z}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GoldwasserL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GoldwasserK05, author = {Shafi Goldwasser and Yael Tauman Kalai}, title = {On the Impossibility of Obfuscation with Auxiliary Input}, booktitle = {46th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS} 2005), 23-25 October 2005, Pittsburgh, PA, USA, Proceedings}, pages = {553--562}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SFCS.2005.60}, doi = {10.1109/SFCS.2005.60}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GoldwasserK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GoldwasserK05, author = {Shafi Goldwasser and Dmitriy Kharchenko}, editor = {Joe Kilian}, title = {Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {529--555}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_29}, doi = {10.1007/978-3-540-30576-7\_29}, timestamp = {Sun, 02 Jun 2019 21:21:22 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GoldwasserK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/GoldwasserSV05, author = {Shafi Goldwasser and Madhu Sudan and Vinod Vaikuntanathan}, editor = {Pierre Fraigniaud}, title = {Distributed Computing with Imperfect Randomness}, booktitle = {Distributed Computing, 19th International Conference, {DISC} 2005, Cracow, Poland, September 26-29, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3724}, pages = {288--302}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11561927\_22}, doi = {10.1007/11561927\_22}, timestamp = {Tue, 14 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wdag/GoldwasserSV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GoldwasserW04, author = {Shafi Goldwasser and Erez Waisbard}, editor = {Moni Naor}, title = {Transformation of Digital Signature Schemes into Designated Confirmer Signature Schemes}, booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC} 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2951}, pages = {77--100}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24638-1\_5}, doi = {10.1007/978-3-540-24638-1\_5}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GoldwasserW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GoldreichGN03, author = {Oded Goldreich and Shafi Goldwasser and Asaf Nussboim}, title = {On the Implementation of Huge Random Objects}, booktitle = {44th Symposium on Foundations of Computer Science {(FOCS} 2003), 11-14 October 2003, Cambridge, MA, USA, Proceedings}, pages = {68--79}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/SFCS.2003.1238182}, doi = {10.1109/SFCS.2003.1238182}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GoldreichGN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GoldwasserK03, author = {Shafi Goldwasser and Yael Tauman Kalai}, title = {On the (In)security of the Fiat-Shamir Paradigm}, booktitle = {44th Symposium on Foundations of Computer Science {(FOCS} 2003), 11-14 October 2003, Cambridge, MA, USA, Proceedings}, pages = {102--113}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/SFCS.2003.1238185}, doi = {10.1109/SFCS.2003.1238185}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GoldwasserK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/AkaviaGS03, author = {Adi Akavia and Shafi Goldwasser and Shmuel Safra}, title = {Proving Hard-Core Predicates Using List Decoding}, booktitle = {44th Symposium on Foundations of Computer Science {(FOCS} 2003), 11-14 October 2003, Cambridge, MA, USA, Proceedings}, pages = {146--157}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/SFCS.2003.1238189}, doi = {10.1109/SFCS.2003.1238189}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/focs/AkaviaGS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR03-015, author = {Shafi Goldwasser and Yael Tauman}, title = {On the (In)security of the Fiat-Shamir Paradigm}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR03-015}}, year = {2003}, url = {https://eccc.weizmann.ac.il/eccc-reports/2003/TR03-015/index.html}, eprinttype = {ECCC}, eprint = {TR03-015}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR03-015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR03-045, author = {Oded Goldreich and Shafi Goldwasser and Asaf Nussboim}, title = {On the Implementation of Huge Random Objects}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR03-045}}, year = {2003}, url = {https://eccc.weizmann.ac.il/eccc-reports/2003/TR03-045/index.html}, eprinttype = {ECCC}, eprint = {TR03-045}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR03-045.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserT03, author = {Shafi Goldwasser and Yael Tauman}, title = {On the (In)security of the Fiat-Shamir Paradigm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {34}, year = {2003}, url = {http://eprint.iacr.org/2003/034}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0018102, author = {Daniele Micciancio and Shafi Goldwasser}, title = {Complexity of lattice problems - a cryptographic perspective}, series = {The Kluwer international series in engineering and computer science}, volume = {671}, publisher = {Springer}, year = {2002}, isbn = {978-0-7923-7688-0}, timestamp = {Tue, 13 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/0018102.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/GoldwasserL02, author = {Shafi Goldwasser and Yehuda Lindell}, editor = {Dahlia Malkhi}, title = {Secure Computation without Agreement}, booktitle = {Distributed Computing, 16th International Conference, {DISC} 2002, Toulouse, France, October 28-30, 2002 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2508}, pages = {17--32}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36108-1\_2}, doi = {10.1007/3-540-36108-1\_2}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wdag/GoldwasserL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserL02, author = {Shafi Goldwasser and Yehuda Lindell}, title = {Secure Computation Without Agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {40}, year = {2002}, url = {http://eprint.iacr.org/2002/040}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareFGM01, author = {Mihir Bellare and Marc Fischlin and Shafi Goldwasser and Silvio Micali}, editor = {Birgit Pfitzmann}, title = {Identification Protocols Secure against Reset Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {495--511}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_30}, doi = {10.1007/3-540-44987-6\_30}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareFGM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BarakGGL01, author = {Boaz Barak and Oded Goldreich and Shafi Goldwasser and Yehuda Lindell}, title = {Resettably-Sound Zero-Knowledge and its Applications}, booktitle = {42nd Annual Symposium on Foundations of Computer Science, {FOCS} 2001, 14-17 October 2001, Las Vegas, Nevada, {USA}}, pages = {116--125}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/SFCS.2001.959886}, doi = {10.1109/SFCS.2001.959886}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/BarakGGL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakGGL01, author = {Boaz Barak and Oded Goldreich and Shafi Goldwasser and Yehuda Lindell}, title = {Resettably-Sound Zero-Knowledge and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {63}, year = {2001}, url = {http://eprint.iacr.org/2001/063}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakGGL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/combinatorica/GoldreichGLRS00, author = {Oded Goldreich and Shafi Goldwasser and Eric Lehman and Dana Ron and Alex Samorodnitsky}, title = {Testing Monotonicity}, journal = {Comb.}, volume = {20}, number = {3}, pages = {301--337}, year = {2000}, url = {https://doi.org/10.1007/s004930070011}, doi = {10.1007/S004930070011}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/combinatorica/GoldreichGLRS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/GoldreichG00, author = {Oded Goldreich and Shafi Goldwasser}, title = {On the Limits of Nonapproximability of Lattice Problems}, journal = {J. Comput. Syst. Sci.}, volume = {60}, number = {3}, pages = {540--563}, year = {2000}, url = {https://doi.org/10.1006/jcss.1999.1686}, doi = {10.1006/JCSS.1999.1686}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/GoldreichG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/CanettiGGM00, author = {Ran Canetti and Oded Goldreich and Shafi Goldwasser and Silvio Micali}, editor = {F. Frances Yao and Eugene M. Luks}, title = {Resettable zero-knowledge (extended abstract)}, booktitle = {Proceedings of the Thirty-Second Annual {ACM} Symposium on Theory of Computing, May 21-23, 2000, Portland, OR, {USA}}, pages = {235--244}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/335305.335334}, doi = {10.1145/335305.335334}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/CanettiGGM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareFGM00, author = {Mihir Bellare and Marc Fischlin and Shafi Goldwasser and Silvio Micali}, title = {Identification Protocols Secure Against Reset Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {2000}, url = {http://eprint.iacr.org/2000/015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareFGM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/GoldwasserK99, author = {Shafi Goldwasser and Joe Kilian}, title = {Primality Testing Using Elliptic Curves}, journal = {J. {ACM}}, volume = {46}, number = {4}, pages = {450--472}, year = {1999}, url = {https://doi.org/10.1145/320211.320213}, doi = {10.1145/320211.320213}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/GoldwasserK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CanettiG99, author = {Ran Canetti and Shafi Goldwasser}, editor = {Jacques Stern}, title = {An Efficient \emph{Threshold} Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {90--106}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_7}, doi = {10.1007/3-540-48910-X\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CanettiG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR99-024, author = {Oded Goldreich and Shafi Goldwasser and Silvio Micali}, title = {Interleaved Zero-Knowledge in the Public-Key Model}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR99-024}}, year = {1999}, url = {https://eccc.weizmann.ac.il/eccc-reports/1999/TR99-024/index.html}, eprinttype = {ECCC}, eprint = {TR99-024}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR99-024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR99-042, author = {Ran Canetti and Oded Goldreich and Shafi Goldwasser and Silvio Micali}, title = {Resettable Zero-Knowledge}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR99-042}}, year = {1999}, url = {https://eccc.weizmann.ac.il/eccc-reports/1999/TR99-042/index.html}, eprinttype = {ECCC}, eprint = {TR99-042}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR99-042.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldreichGM99, author = {Oded Goldreich and Shafi Goldwasser and Silvio Micali}, title = {Interleaved Zero-Knowledge in the Public-Key Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {1999}, url = {http://eprint.iacr.org/1999/015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldreichGM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiGGM99, author = {Ran Canetti and Oded Goldreich and Shafi Goldwasser and Silvio Micali}, title = {Resettable Zero-Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {22}, year = {1999}, url = {http://eprint.iacr.org/1999/022}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiGGM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/GoldreichGR98, author = {Oded Goldreich and Shafi Goldwasser and Dana Ron}, title = {Property Testing and its Connection to Learning and Approximation}, journal = {J. {ACM}}, volume = {45}, number = {4}, pages = {653--750}, year = {1998}, url = {https://doi.org/10.1145/285055.285060}, doi = {10.1145/285055.285060}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jacm/GoldreichGR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/GoldreichGL98, author = {Oded Goldreich and Shafi Goldwasser and Nathan Linial}, title = {Fault-Tolerant Computation in the Full Information Model}, journal = {{SIAM} J. Comput.}, volume = {27}, number = {2}, pages = {506--544}, year = {1998}, url = {https://doi.org/10.1137/S0097539793246689}, doi = {10.1137/S0097539793246689}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/siamcomp/GoldreichGL98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/Goldwasser98, author = {Shafi Goldwasser}, title = {Introduction to Special Section on Probabilistic Proof Systems}, journal = {{SIAM} J. Comput.}, volume = {27}, number = {3}, pages = {737--738}, year = {1998}, url = {https://doi.org/10.1137/SMJCAT000027000003000737000001}, doi = {10.1137/SMJCAT000027000003000737000001}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/Goldwasser98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GoldreichGLR98, author = {Oded Goldreich and Shafi Goldwasser and Eric Lehman and Dana Ron}, title = {Testing Monotonicity}, booktitle = {39th Annual Symposium on Foundations of Computer Science, {FOCS} '98, November 8-11, 1998, Palo Alto, California, {USA}}, pages = {426--435}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/SFCS.1998.743493}, doi = {10.1109/SFCS.1998.743493}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GoldreichGLR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/random/GertnerGM98, author = {Yael Gertner and Shafi Goldwasser and Tal Malkin}, editor = {Michael Luby and Jos{\'{e}} D. P. Rolim and Maria J. Serna}, title = {A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic {PIR} Avoiding Database Replication}, booktitle = {Randomization and Approximation Techniques in Computer Science, Second International Workshop, RANDOM'98, Barcelona, Spain, October 8-10, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1518}, pages = {200--217}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49543-6\_17}, doi = {10.1007/3-540-49543-6\_17}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/random/GertnerGM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GoldreichG98, author = {Oded Goldreich and Shafi Goldwasser}, editor = {Jeffrey Scott Vitter}, title = {On the Limits of Non-Approximability of Lattice Problems}, booktitle = {Proceedings of the Thirtieth Annual {ACM} Symposium on the Theory of Computing, Dallas, Texas, USA, May 23-26, 1998}, pages = {1--9}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/276698.276704}, doi = {10.1145/276698.276704}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GoldreichG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldreichG98, author = {Oded Goldreich and Shafi Goldwasser}, title = {On the possibility of basing Cryptography on the assumption that {P} {\(\not =\)} {NP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {5}, year = {1998}, url = {http://eprint.iacr.org/1998/005}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldreichG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GertnerGM98, author = {Yael Gertner and Shafi Goldwasser and Tal Malkin}, title = {A Random Server Model for Private Information Retrieval (or How to Achieve Information Theoretic {PIR} Avoiding Data Replication)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {1998}, url = {http://eprint.iacr.org/1998/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GertnerGM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BellareG97, author = {Mihir Bellare and Shafi Goldwasser}, editor = {Richard Graveman and Philippe A. Janson and Clifford Neuman and Li Gong}, title = {Verifiable Partial Key Escrow}, booktitle = {{CCS} '97, Proceedings of the 4th {ACM} Conference on Computer and Communications Security, Zurich, Switzerland, April 1-4, 1997}, pages = {78--91}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/266420.266439}, doi = {10.1145/266420.266439}, timestamp = {Tue, 10 Nov 2020 20:00:22 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BellareG97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoldreichGH97, author = {Oded Goldreich and Shafi Goldwasser and Shai Halevi}, editor = {Burton S. Kaliski Jr.}, title = {Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem}, booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {105--111}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052230}, doi = {10.1007/BFB0052230}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoldreichGH97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoldreichGH97a, author = {Oded Goldreich and Shafi Goldwasser and Shai Halevi}, editor = {Burton S. Kaliski Jr.}, title = {Public-Key Cryptosystems from Lattice Reduction Problems}, booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {112--131}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052231}, doi = {10.1007/BFB0052231}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GoldreichGH97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareGM97, author = {Mihir Bellare and Shafi Goldwasser and Daniele Micciancio}, editor = {Burton S. Kaliski Jr.}, title = {"Pseudo-Random" Number Generation Within Cryptographic Algorithms: The {DDS} Case}, booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {277--291}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052242}, doi = {10.1007/BFB0052242}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareGM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/Goldwasser97, author = {Shafi Goldwasser}, title = {New Directions in Cryptography: Twenty Some Years Later}, booktitle = {38th Annual Symposium on Foundations of Computer Science, {FOCS} '97, Miami Beach, Florida, USA, October 19-22, 1997}, pages = {314--324}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/SFCS.1997.646120}, doi = {10.1109/SFCS.1997.646120}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/Goldwasser97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/Goldwasser97, author = {Shafi Goldwasser}, editor = {James E. Burns and Hagit Attiya}, title = {Multi-Party Computations: Past and Present}, booktitle = {Proceedings of the Sixteenth Annual {ACM} Symposium on Principles of Distributed Computing, Santa Barbara, California, USA, August 21-24, 1997}, pages = {1--6}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/259380.259405}, doi = {10.1145/259380.259405}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/Goldwasser97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR97-018, author = {Oded Goldreich and Shafi Goldwasser and Shai Halevi}, title = {Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR97-018}}, year = {1997}, url = {https://eccc.weizmann.ac.il/eccc-reports/1997/TR97-018/index.html}, eprinttype = {ECCC}, eprint = {TR97-018}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR97-018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR97-031, author = {Oded Goldreich and Shafi Goldwasser}, title = {On the Limits of Non-Approximability of Lattice Problems}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR97-031}}, year = {1997}, url = {https://eccc.weizmann.ac.il/eccc-reports/1997/TR97-031/index.html}, eprinttype = {ECCC}, eprint = {TR97-031}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR97-031.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/FeigeGLSS96, author = {Uriel Feige and Shafi Goldwasser and L{\'{a}}szl{\'{o}} Lov{\'{a}}sz and Shmuel Safra and Mario Szegedy}, title = {Interactive Proofs and the Hardness of Approximating Cliques}, journal = {J. {ACM}}, volume = {43}, number = {2}, pages = {268--292}, year = {1996}, url = {https://doi.org/10.1145/226643.226652}, doi = {10.1145/226643.226652}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jacm/FeigeGLSS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GoldreichGR96, author = {Oded Goldreich and Shafi Goldwasser and Dana Ron}, title = {Property Testing and Its Connection to Learning and Approximation}, booktitle = {37th Annual Symposium on Foundations of Computer Science, {FOCS} '96, Burlington, Vermont, USA, 14-16 October, 1996}, pages = {339--348}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/SFCS.1996.548493}, doi = {10.1109/SFCS.1996.548493}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GoldreichGR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR96-042, author = {Oded Goldreich and Shafi Goldwasser and Shai Halevi}, title = {Collision-Free Hashing from Lattice Problems}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR96-042}}, year = {1996}, url = {https://eccc.weizmann.ac.il/eccc-reports/1996/TR96-042/index.html}, eprinttype = {ECCC}, eprint = {TR96-042}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR96-042.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR96-056, author = {Oded Goldreich and Shafi Goldwasser and Shai Halevi}, title = {Public-Key Cryptosystems from Lattice Reduction Problems}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR96-056}}, year = {1996}, url = {https://eccc.weizmann.ac.il/eccc-reports/1996/TR96-056/index.html}, eprinttype = {ECCC}, eprint = {TR96-056}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR96-056.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR96-057, author = {Oded Goldreich and Shafi Goldwasser and Dana Ron}, title = {Property Testing and its connection to Learning and Approximation}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR96-057}}, year = {1996}, url = {https://eccc.weizmann.ac.il/eccc-reports/1996/TR96-057/index.html}, eprinttype = {ECCC}, eprint = {TR96-057}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR96-057.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldreichGH96, author = {Oded Goldreich and Shafi Goldwasser and Shai Halevi}, title = {Collision-Free Hashing from Lattice Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {9}, year = {1996}, url = {http://eprint.iacr.org/1996/009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldreichGH96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareG96, author = {Mihir Bellare and Shafi Goldwasser}, title = {Verifiable Partial Key Escrow}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {1996}, url = {http://eprint.iacr.org/1996/015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareG96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldreichGH96a, author = {Oded Goldreich and Shafi Goldwasser and Shai Halevi}, title = {Public-Key Cryptosystems from Lattice Reduction Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {1996}, url = {http://eprint.iacr.org/1996/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldreichGH96a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/Goldwasser95, author = {Shafi Goldwasser}, editor = {Friedbert Huber{-}W{\"{a}}schle and Helmut Schauer and Peter Widmayer}, title = {Probabilistically Checkable Proofs and Applications}, booktitle = {{GISI} 95, Herausforderungen eines globalen Informationsverbundes f{\"{u}}r die Informatik, 25. GI-Jahrestagung und 13. Schweizer Informatikertag, Z{\"{u}}rich, Schweiz, 18.-20. September 1995}, series = {Informatik Aktuell}, pages = {13--25}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/978-3-642-79958-7\_2}, doi = {10.1007/978-3-642-79958-7\_2}, timestamp = {Tue, 23 May 2017 01:10:34 +0200}, biburl = {https://dblp.org/rec/conf/gi/Goldwasser95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BellareGG95, author = {Mihir Bellare and Oded Goldreich and Shafi Goldwasser}, editor = {Frank Thomson Leighton and Allan Borodin}, title = {Incremental cryptography and application to virus protection}, booktitle = {Proceedings of the Twenty-Seventh Annual {ACM} Symposium on Theory of Computing, 29 May-1 June 1995, Las Vegas, Nevada, {USA}}, pages = {45--56}, publisher = {{ACM}}, year = {1995}, url = {https://doi.org/10.1145/225058.225080}, doi = {10.1145/225058.225080}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/BellareGG95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/BellareG94, author = {Mihir Bellare and Shafi Goldwasser}, title = {The Complexity of Decision Versus Search}, journal = {{SIAM} J. Comput.}, volume = {23}, number = {1}, pages = {97--119}, year = {1994}, url = {https://doi.org/10.1137/S0097539792228289}, doi = {10.1137/S0097539792228289}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/BellareG94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareGG94, author = {Mihir Bellare and Oded Goldreich and Shafi Goldwasser}, editor = {Yvo Desmedt}, title = {Incremental Cryptography: The Case of Hashing and Signing}, booktitle = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {839}, pages = {216--233}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-48658-5\_22}, doi = {10.1007/3-540-48658-5\_22}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareGG94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BellareGLR94, author = {Mihir Bellare and Shafi Goldwasser and Carsten Lund and Alexander Russell}, editor = {Frank Thomson Leighton and Michael T. Goodrich}, title = {Efficient probabilistic checkable proofs and applications to approximation}, booktitle = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Theory of Computing, 23-25 May 1994, Montr{\'{e}}al, Qu{\'{e}}bec, Canada}, pages = {820}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/195058.195467}, doi = {10.1145/195058.195467}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/BellareGLR94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cc/BellareGG93, author = {Mihir Bellare and Oded Goldreich and Shafi Goldwasser}, title = {Randomness in Interactive Proofs}, journal = {Comput. Complex.}, volume = {3}, pages = {319--354}, year = {1993}, url = {https://doi.org/10.1007/BF01275487}, doi = {10.1007/BF01275487}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cc/BellareGG93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/istcs/Goldwasser93, author = {Shafi Goldwasser}, title = {Efficient Interactive Proofs and Applications to Approximation}, booktitle = {Second Israel Symposium on Theory of Computing Systems, {ISTCS} 1993, Natanya, Israel, June 7-9, 1993, Proceedings}, pages = {1--2}, publisher = {{IEEE} Computer Society}, year = {1993}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/istcs/Goldwasser93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BellareGLR93, author = {Mihir Bellare and Shafi Goldwasser and Carsten Lund and Alexander Russell}, editor = {S. Rao Kosaraju and David S. Johnson and Alok Aggarwal}, title = {Efficient probabilistically checkable proofs and applications to approximations}, booktitle = {Proceedings of the Twenty-Fifth Annual {ACM} Symposium on Theory of Computing, May 16-18, 1993, San Diego, CA, {USA}}, pages = {294--304}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/167088.167174}, doi = {10.1145/167088.167174}, timestamp = {Sat, 27 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/BellareGLR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoldwasserO92, author = {Shafi Goldwasser and Rafail Ostrovsky}, editor = {Ernest F. Brickell}, title = {Invariant Signatures and Non-Interactive Zero-Knowledge Proofs are Equivalent (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {740}, pages = {228--245}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-48071-4\_16}, doi = {10.1007/3-540-48071-4\_16}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoldwasserO92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/FeigeGLSS91, author = {Uriel Feige and Shafi Goldwasser and L{\'{a}}szl{\'{o}} Lov{\'{a}}sz and Shmuel Safra and Mario Szegedy}, title = {Approximating Clique is Almost NP-Complete (Preliminary Version)}, booktitle = {32nd Annual Symposium on Foundations of Computer Science, San Juan, Puerto Rico, 1-4 October 1991}, pages = {2--12}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/SFCS.1991.185341}, doi = {10.1109/SFCS.1991.185341}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/focs/FeigeGLSS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BeigelBFG91, author = {Richard Beigel and Mihir Bellare and Joan Feigenbaum and Shafi Goldwasser}, title = {Languages that Are Easier than their Proofs}, booktitle = {32nd Annual Symposium on Foundations of Computer Science, San Juan, Puerto Rico, 1-4 October 1991}, pages = {19--28}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/SFCS.1991.185343}, doi = {10.1109/SFCS.1991.185343}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/BeigelBFG91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GoldreichGL91, author = {Oded Goldreich and Shafi Goldwasser and Nathan Linial}, title = {Fault-tolerant Computation in the Full Information Model (Extended Abstract)}, booktitle = {32nd Annual Symposium on Foundations of Computer Science, San Juan, Puerto Rico, 1-4 October 1991}, pages = {447--457}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/SFCS.1991.185405}, doi = {10.1109/SFCS.1991.185405}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GoldreichGL91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/combinatorica/AielloGH90, author = {William Aiello and Shafi Goldwasser and Johan H{\aa}stad}, title = {On the power of interaction}, journal = {Comb.}, volume = {10}, number = {1}, pages = {3--25}, year = {1990}, url = {https://doi.org/10.1007/BF02122692}, doi = {10.1007/BF02122692}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/combinatorica/AielloGH90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoldwasserL90, author = {Shafi Goldwasser and Leonid A. Levin}, editor = {Alfred Menezes and Scott A. Vanstone}, title = {Fair Computation of General Functions in Presence of Immoral Majority}, booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {537}, pages = {77--93}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-38424-3\_6}, doi = {10.1007/3-540-38424-3\_6}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoldwasserL90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BellareGG90, author = {Mihir Bellare and Oded Goldreich and Shafi Goldwasser}, title = {Randomness in Interactive Proofs}, booktitle = {31st Annual Symposium on Foundations of Computer Science, St. Louis, Missouri, USA, October 22-24, 1990, Volume {II}}, pages = {563--572}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/FSCS.1990.89577}, doi = {10.1109/FSCS.1990.89577}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/BellareGG90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/1988, editor = {Shafi Goldwasser}, title = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/0-387-34799-2}, doi = {10.1007/0-387-34799-2}, isbn = {3-540-97196-3}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/1988.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acr/GoldwasserS89, author = {Shafi Goldwasser and Michael Sipser}, title = {Private Coins versus Public Coins in Interactive Proof Systems}, journal = {Adv. Comput. Res.}, volume = {5}, pages = {73--90}, year = {1989}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acr/GoldwasserS89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/GoldwasserMR89, author = {Shafi Goldwasser and Silvio Micali and Charles Rackoff}, title = {The Knowledge Complexity of Interactive Proof Systems}, journal = {{SIAM} J. Comput.}, volume = {18}, number = {1}, pages = {186--208}, year = {1989}, url = {https://doi.org/10.1137/0218012}, doi = {10.1137/0218012}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/siamcomp/GoldwasserMR89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareG89, author = {Mihir Bellare and Shafi Goldwasser}, editor = {Gilles Brassard}, title = {New Paradigms for Digital Signatures and Message Authentication Based on Non-Interative Zero Knowledge Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {194--211}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_19}, doi = {10.1007/0-387-34805-0\_19}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareG89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Ben-OrGKW89, author = {Michael Ben{-}Or and Shafi Goldwasser and Joe Kilian and Avi Wigderson}, editor = {Gilles Brassard}, title = {Efficient Identification Schemes Using Two Prover Interactive Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {498--506}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_44}, doi = {10.1007/0-387-34805-0\_44}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Ben-OrGKW89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeaverG89, author = {Donald Beaver and Shafi Goldwasser}, editor = {Gilles Brassard}, title = {Multiparty Computation with Faulty Majority}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {589--590}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_51}, doi = {10.1007/0-387-34805-0\_51}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeaverG89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareCG89, author = {Mihir Bellare and Lenore Cowen and Shafi Goldwasser}, editor = {Gilles Brassard}, title = {On the Structure of Secret Key Exchange Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {604--605}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_53}, doi = {10.1007/0-387-34805-0\_53}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareCG89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/BellareCG89, author = {Mihir Bellare and Lenore Cowen and Shafi Goldwasser}, editor = {Joan Feigenbaum and Michael Merritt}, title = {On the Structure of Secret Key Exchange Protocols}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {79--92}, publisher = {{DIMACS/AMS}}, year = {1989}, url = {https://doi.org/10.1090/dimacs/002/04}, doi = {10.1090/DIMACS/002/04}, timestamp = {Mon, 22 May 2023 16:07:35 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/BellareCG89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BeaverG89, author = {Donald Beaver and Shafi Goldwasser}, title = {Multiparty Computation with Faulty Majority (Extended Announcement)}, booktitle = {30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October - 1 November 1989}, pages = {468--473}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/SFCS.1989.63520}, doi = {10.1109/SFCS.1989.63520}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/BeaverG89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/GoldwasserMR88, author = {Shafi Goldwasser and Silvio Micali and Ronald L. Rivest}, title = {A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks}, journal = {{SIAM} J. Comput.}, volume = {17}, number = {2}, pages = {281--308}, year = {1988}, url = {https://doi.org/10.1137/0217017}, doi = {10.1137/0217017}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/siamcomp/GoldwasserMR88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Ben-OrGGHKMR88, author = {Michael Ben{-}Or and Oded Goldreich and Shafi Goldwasser and Johan H{\aa}stad and Joe Kilian and Silvio Micali and Phillip Rogaway}, editor = {Shafi Goldwasser}, title = {Everything Provable is Provable in Zero-Knowledge}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {37--56}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_4}, doi = {10.1007/0-387-34799-2\_4}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Ben-OrGGHKMR88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/Ben-OrGW88, author = {Michael Ben{-}Or and Shafi Goldwasser and Avi Wigderson}, editor = {Janos Simon}, title = {Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract)}, booktitle = {Proceedings of the 20th Annual {ACM} Symposium on Theory of Computing, May 2-4, 1988, Chicago, Illinois, {USA}}, pages = {1--10}, publisher = {{ACM}}, year = {1988}, url = {https://doi.org/10.1145/62212.62213}, doi = {10.1145/62212.62213}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/Ben-OrGW88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/Ben-OrGKW88, author = {Michael Ben{-}Or and Shafi Goldwasser and Joe Kilian and Avi Wigderson}, editor = {Janos Simon}, title = {Multi-Prover Interactive Proofs: How to Remove Intractability Assumptions}, booktitle = {Proceedings of the 20th Annual {ACM} Symposium on Theory of Computing, May 2-4, 1988, Chicago, Illinois, {USA}}, pages = {113--131}, publisher = {{ACM}}, year = {1988}, url = {https://doi.org/10.1145/62212.62223}, doi = {10.1145/62212.62223}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/Ben-OrGKW88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/GoldreichGM86, author = {Oded Goldreich and Shafi Goldwasser and Silvio Micali}, title = {How to construct random functions}, journal = {J. {ACM}}, volume = {33}, number = {4}, pages = {792--807}, year = {1986}, url = {https://doi.org/10.1145/6490.6503}, doi = {10.1145/6490.6503}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/GoldreichGM86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/AielloGH86, author = {William Aiello and Shafi Goldwasser and Johan H{\aa}stad}, title = {On the Power of Interaction}, booktitle = {27th Annual Symposium on Foundations of Computer Science, Toronto, Canada, 27-29 October 1986}, pages = {368--379}, publisher = {{IEEE} Computer Society}, year = {1986}, url = {https://doi.org/10.1109/SFCS.1986.36}, doi = {10.1109/SFCS.1986.36}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/AielloGH86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GoldwasserS86, author = {Shafi Goldwasser and Michael Sipser}, editor = {Juris Hartmanis}, title = {Private Coins versus Public Coins in Interactive Proof Systems}, booktitle = {Proceedings of the 18th Annual {ACM} Symposium on Theory of Computing, May 28-30, 1986, Berkeley, California, {USA}}, pages = {59--68}, publisher = {{ACM}}, year = {1986}, url = {https://doi.org/10.1145/12130.12137}, doi = {10.1145/12130.12137}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GoldwasserS86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GoldwasserK86, author = {Shafi Goldwasser and Joe Kilian}, editor = {Juris Hartmanis}, title = {Almost All Primes Can Be Quickly Certified}, booktitle = {Proceedings of the 18th Annual {ACM} Symposium on Theory of Computing, May 28-30, 1986, Berkeley, California, {USA}}, pages = {316--329}, publisher = {{ACM}}, year = {1986}, url = {https://doi.org/10.1145/12130.12162}, doi = {10.1145/12130.12162}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GoldwasserK86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChorGG85, author = {Benny Chor and Oded Goldreich and Shafi Goldwasser}, editor = {Hugh C. Williams}, title = {The Bit Security of Modular Squaring Given Partial Factorization of the Modulos}, booktitle = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {218}, pages = {448--457}, publisher = {Springer}, year = {1985}, url = {https://doi.org/10.1007/3-540-39799-X\_35}, doi = {10.1007/3-540-39799-X\_35}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChorGG85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/ChorGMA85, author = {Benny Chor and Shafi Goldwasser and Silvio Micali and Baruch Awerbuch}, title = {Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults (Extended Abstract)}, booktitle = {26th Annual Symposium on Foundations of Computer Science, Portland, Oregon, USA, 21-23 October 1985}, pages = {383--395}, publisher = {{IEEE} Computer Society}, year = {1985}, url = {https://doi.org/10.1109/SFCS.1985.64}, doi = {10.1109/SFCS.1985.64}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/ChorGMA85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GoldwasserMR85, author = {Shafi Goldwasser and Silvio Micali and Charles Rackoff}, editor = {Robert Sedgewick}, title = {The Knowledge Complexity of Interactive Proof-Systems (Extended Abstract)}, booktitle = {Proceedings of the 17th Annual {ACM} Symposium on Theory of Computing, May 6-8, 1985, Providence, Rhode Island, {USA}}, pages = {291--304}, publisher = {{ACM}}, year = {1985}, url = {https://doi.org/10.1145/22145.22178}, doi = {10.1145/22145.22178}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GoldwasserMR85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/GoldwasserM84, author = {Shafi Goldwasser and Silvio Micali}, title = {Probabilistic Encryption}, journal = {J. Comput. Syst. Sci.}, volume = {28}, number = {2}, pages = {270--299}, year = {1984}, url = {https://doi.org/10.1016/0022-0000(84)90070-9}, doi = {10.1016/0022-0000(84)90070-9}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/GoldwasserM84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoldreichGM84, author = {Oded Goldreich and Shafi Goldwasser and Silvio Micali}, editor = {G. R. Blakley and David Chaum}, title = {On the Cryptographic Applications of Random Functions}, booktitle = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {196}, pages = {276--288}, publisher = {Springer}, year = {1984}, url = {https://doi.org/10.1007/3-540-39568-7\_22}, doi = {10.1007/3-540-39568-7\_22}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoldreichGM84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlumG84, author = {Manuel Blum and Shafi Goldwasser}, editor = {G. R. Blakley and David Chaum}, title = {An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information}, booktitle = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {196}, pages = {289--302}, publisher = {Springer}, year = {1984}, url = {https://doi.org/10.1007/3-540-39568-7\_23}, doi = {10.1007/3-540-39568-7\_23}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlumG84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoldwasserMR84, author = {Shafi Goldwasser and Silvio Micali and Ronald L. Rivest}, editor = {G. R. Blakley and David Chaum}, title = {A "Paradoxical'"Solution to the Signature Problem (Abstract)}, booktitle = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {196}, pages = {467}, publisher = {Springer}, year = {1984}, url = {https://doi.org/10.1007/3-540-39568-7\_37}, doi = {10.1007/3-540-39568-7\_37}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoldwasserMR84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GoldwasserMR84, author = {Shafi Goldwasser and Silvio Micali and Ronald L. Rivest}, title = {A "Paradoxical" Solution to the Signature Problem (Extended Abstract)}, booktitle = {25th Annual Symposium on Foundations of Computer Science, West Palm Beach, Florida, USA, 24-26 October 1984}, pages = {441--448}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SFCS.1984.715946}, doi = {10.1109/SFCS.1984.715946}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GoldwasserMR84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GoldreichGM84, author = {Oded Goldreich and Shafi Goldwasser and Silvio Micali}, title = {How to Construct Random Functions (Extended Abstract)}, booktitle = {25th Annual Symposium on Foundations of Computer Science, West Palm Beach, Florida, USA, 24-26 October 1984}, pages = {464--479}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SFCS.1984.715949}, doi = {10.1109/SFCS.1984.715949}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GoldreichGM84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GoldwasserMY83, author = {Shafi Goldwasser and Silvio Micali and Andrew Chi{-}Chih Yao}, editor = {David S. Johnson and Ronald Fagin and Michael L. Fredman and David Harel and Richard M. Karp and Nancy A. Lynch and Christos H. Papadimitriou and Ronald L. Rivest and Walter L. Ruzzo and Joel I. Seiferas}, title = {Strong Signature Schemes}, booktitle = {Proceedings of the 15th Annual {ACM} Symposium on Theory of Computing, 25-27 April, 1983, Boston, Massachusetts, {USA}}, pages = {431--439}, publisher = {{ACM}}, year = {1983}, url = {https://doi.org/10.1145/800061.808774}, doi = {10.1145/800061.808774}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GoldwasserMY83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/YaoMG82, author = {Shafi Goldwasser and Silvio Micali and Andrew Chi{-}Chih Yao}, editor = {David Chaum and Ronald L. Rivest and Alan T. Sherman}, title = {On Signatures and Authentication}, booktitle = {Advances in Cryptology: Proceedings of {CRYPTO} '82, Santa Barbara, California, USA, August 23-25, 1982}, pages = {211--215}, publisher = {Plenum Press, New York}, year = {1982}, url = {https://doi.org/10.1007/978-1-4757-0602-4\_20}, doi = {10.1007/978-1-4757-0602-4\_20}, timestamp = {Thu, 25 Jul 2019 12:26:02 +0200}, biburl = {https://dblp.org/rec/conf/crypto/YaoMG82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GoldwasserMT82, author = {Shafi Goldwasser and Silvio Micali and Po Tong}, title = {Why and How to Establish a Private Code on a Public Network (Extended Abstract)}, booktitle = {23rd Annual Symposium on Foundations of Computer Science, Chicago, Illinois, USA, 3-5 November 1982}, pages = {134--144}, publisher = {{IEEE} Computer Society}, year = {1982}, url = {https://doi.org/10.1109/SFCS.1982.100}, doi = {10.1109/SFCS.1982.100}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GoldwasserMT82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GoldwasserM82, author = {Shafi Goldwasser and Silvio Micali}, editor = {Harry R. Lewis and Barbara B. Simons and Walter A. Burkhard and Lawrence H. Landweber}, title = {Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information}, booktitle = {Proceedings of the 14th Annual {ACM} Symposium on Theory of Computing, May 5-7, 1982, San Francisco, California, {USA}}, pages = {365--377}, publisher = {{ACM}}, year = {1982}, url = {https://doi.org/10.1145/800070.802212}, doi = {10.1145/800070.802212}, timestamp = {Wed, 14 Nov 2018 10:51:38 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GoldwasserM82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.