Kondi, Yashvanth; Shelat, Abhi Improved straight-line extraction in the random oracle model with applications to signature aggregation. (English) Zbl 1519.94147 Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13792, 279-309 (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{Y. Kondi} and \textit{A. Shelat}, Lect. Notes Comput. Sci. 13792, 279--309 (2023; Zbl 1519.94147) Full Text: DOI
Cohen, Ran; Shelat, Abhi; Wichs, Daniel Adaptively secure MPC with sublinear communication complexity. (English) Zbl 1511.94006 J. Cryptology 36, No. 2, Paper No. 11, 82 p. (2023). MSC: 94A05 94A60 PDFBibTeX XMLCite \textit{R. Cohen} et al., J. Cryptology 36, No. 2, Paper No. 11, 82 p. (2023; Zbl 1511.94006) Full Text: DOI
Cohen, Ran; Doerner, Jack; Kondi, Yashvanth; Shelat, Abhi Guaranteed output in \(O(\sqrt{n})\) rounds for round-robin sampling protocols. (English) Zbl 1497.94081 Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13275, 241-271 (2022). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{R. Cohen} et al., Lect. Notes Comput. Sci. 13275, 241--271 (2022; Zbl 1497.94081) Full Text: DOI
Chen, Megan; Doerner, Jack; Kondi, Yashvanth; Lee, Eysa; Rosefield, Schuyler; Shelat, Abhi; Cohen, Ran Multiparty generation of an RSA modulus. (English) Zbl 1486.94085 J. Cryptology 35, No. 2, Paper No. 12, 84 p. (2022). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. Chen} et al., J. Cryptology 35, No. 2, Paper No. 12, 84 p. (2022; Zbl 1486.94085) Full Text: DOI
Chen, Megan; Cohen, Ran; Doerner, Jack; Kondi, Yashvanth; Lee, Eysa; Rosefield, Schuyler; Shelat, Abhi Multiparty generation of an RSA modulus. (English) Zbl 1504.94121 Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12172, 64-93 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Chen} et al., Lect. Notes Comput. Sci. 12172, 64--93 (2020; Zbl 1504.94121) Full Text: DOI
Hazay, Carmit; Shelat, Abhi; Venkitasubramaniam, Muthuramakrishnan Going beyond dual execution: MPC for functions with efficient verification. (English) Zbl 07436977 Kiayias, Aggelos (ed.) et al., Public-key cryptography – PKC 2020. 23rd IACR international conference on practice and theory of public-key cryptography, Edinburgh, UK, May 4–7, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12111, 328-356 (2020). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{C. Hazay} et al., Lect. Notes Comput. Sci. 12111, 328--356 (2020; Zbl 07436977) Full Text: DOI
Marcedone, Antonio; Pass, Rafael; Shelat, Abhi Minimizing trust in hardware wallets with two factor signatures. (English) Zbl 1460.94056 Goldberg, Ian (ed.) et al., Financial cryptography and data security. 23rd international conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11598, 407-425 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Marcedone} et al., Lect. Notes Comput. Sci. 11598, 407--425 (2019; Zbl 1460.94056) Full Text: DOI
Cohen, Ran; Shelat, Abhi; Wichs, Daniel Adaptively secure MPC with sublinear communication complexity. (English) Zbl 1483.68134 Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11693, 30-60 (2019). MSC: 68Q11 94A60 PDFBibTeX XMLCite \textit{R. Cohen} et al., Lect. Notes Comput. Sci. 11693, 30--60 (2019; Zbl 1483.68134) Full Text: DOI
Hamlin, Ariel; Shelat, Abhi; Weiss, Mor; Wichs, Daniel Multi-key searchable encryption, revisited. (English) Zbl 1385.94040 Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-76577-8/pbk; 978-3-319-76578-5/ebook). Lecture Notes in Computer Science 10769, 95-124 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Hamlin} et al., Lect. Notes Comput. Sci. 10769, 95--124 (2018; Zbl 1385.94040) Full Text: DOI
Fisch, Ben; Pass, Rafael; Shelat, Abhi Socially optimal mining pools. (English) Zbl 1405.91187 Devanur, Nikhil R. (ed.) et al., Web and internet economics. 13th international conference, WINE 2017, Bangalore, India, December 17–20, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-71923-8/pbk; 978-3-319-71924-5/ebook). Lecture Notes in Computer Science 10660, 205-218 (2017). MSC: 91B16 68M11 PDFBibTeX XMLCite \textit{B. Fisch} et al., Lect. Notes Comput. Sci. 10660, 205--218 (2017; Zbl 1405.91187) Full Text: DOI arXiv
Pass, Rafael; Seeman, Lior; Shelat, Abhi Analysis of the blockchain protocol in asynchronous networks. (English) Zbl 1415.94455 Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10211, 643-673 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Pass} et al., Lect. Notes Comput. Sci. 10211, 643--673 (2017; Zbl 1415.94455) Full Text: DOI
Marcedone, Antonio; Pass, Rafael; Shelat, Abhi Bounded KDM security from iO and OWF. (English) Zbl 1482.94054 Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9841, 571-586 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Marcedone} et al., Lect. Notes Comput. Sci. 9841, 571--586 (2016; Zbl 1482.94054) Full Text: DOI
Mahmoody, Mohammad; Mohammed, Ameer; Nematihaji, Soheil; Pass, Rafael; Shelat, Abhi Lower bounds on assumptions behind indistinguishability obfuscation. (English) Zbl 1388.94072 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 49-66 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Mahmoody} et al., Lect. Notes Comput. Sci. 9562, 49--66 (2016; Zbl 1388.94072) Full Text: DOI
Pass, Rafael; Shelat, Abhi Impossibility of VBB obfuscation with ideal constant-degree graded encodings. (English) Zbl 1388.94075 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 3-17 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Pass} and \textit{A. Shelat}, Lect. Notes Comput. Sci. 9562, 3--17 (2016; Zbl 1388.94075) Full Text: DOI
Shelat, Abhi; Venkitasubramaniam, Muthuramakrishnan Secure computation from millionaire. (English) Zbl 1396.94100 Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 736-757 (2015). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{A. Shelat} and \textit{M. Venkitasubramaniam}, Lect. Notes Comput. Sci. 9452, 736--757 (2015; Zbl 1396.94100) Full Text: DOI
Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent Computing on authenticated data. (English) Zbl 1314.94100 J. Cryptology 28, No. 2, 351-395 (2015). MSC: 94A62 PDFBibTeX XMLCite \textit{J. H. Ahn} et al., J. Cryptology 28, No. 2, 351--395 (2015; Zbl 1314.94100) Full Text: DOI
Myers, Steven; Sergi, Mona; shelat, abhi Black-box proof of knowledge of plaintext and multiparty computation with low communication overhead. (English) Zbl 1315.94096 Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 397-417 (2013). MSC: 94A60 68P25 68Q17 PDFBibTeX XMLCite \textit{S. Myers} et al., Lect. Notes Comput. Sci. 7785, 397--417 (2013; Zbl 1315.94096) Full Text: DOI
Myers, Steven; Sergi, Mona; Shelat, Abhi Blackbox construction of a more than non-malleable CCA1 encryption scheme from plaintext awareness. (English) Zbl 1310.94162 Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 149-165 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Myers} et al., Lect. Notes Comput. Sci. 7485, 149--165 (2012; Zbl 1310.94162) Full Text: DOI
Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent Computing on authenticated data. (English) Zbl 1292.94017 Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 1-20 (2012). MSC: 94A62 PDFBibTeX XMLCite \textit{J. H. Ahn} et al., Lect. Notes Comput. Sci. 7194, 1--20 (2012; Zbl 1292.94017) Full Text: DOI
Hohenberger, Susan; Rothblum, Guy N.; Shelat, Abhi; Vaikuntanathan, Vinod Securely obfuscating re-encryption. (English) Zbl 1251.94031 J. Cryptology 24, No. 4, 694-719 (2011). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Hohenberger} et al., J. Cryptology 24, No. 4, 694--719 (2011; Zbl 1251.94031) Full Text: DOI
Shelat, Abhi; Shen, Chih-hao Two-output secure computation with malicious adversaries. (English) Zbl 1282.68086 Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 386-405 (2011). MSC: 68M12 94A62 PDFBibTeX XMLCite \textit{A. Shelat} and \textit{C.-h. Shen}, Lect. Notes Comput. Sci. 6632, 386--405 (2011; Zbl 1282.68086) Full Text: DOI
Rosen, Alon; Shelat, Abhi Optimistic concurrent zero knowledge. (English) Zbl 1253.94066 Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 359-376 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Rosen} and \textit{A. Shelat}, Lect. Notes Comput. Sci. 6477, 359--376 (2010; Zbl 1253.94066) Full Text: DOI
Myers, Steven; Shelat, Abhi Bit encryption is complete. (English) Zbl 1292.94119 2009 IEEE 50th annual symposium on foundations of computer science – FOCS 2009. Proceedings of the symposium, Atlanta, GA, USA, October 24–27, 2009. Los Alamitos, CA: IEEE Computer Society (ISBN 978-0-7695-3850-1; 978-1-4244-5116-6/ebook). 607-616 (2009). MSC: 94A60 68Q17 PDFBibTeX XMLCite \textit{S. Myers} and \textit{A. Shelat}, in: 2009 IEEE 50th annual symposium on foundations of computer science -- FOCS 2009. Proceedings of the symposium, Atlanta, GA, USA, October 24--27, 2009. Los Alamitos, CA: IEEE Computer Society. 607--616 (2009; Zbl 1292.94119) Full Text: DOI
Joshipura, K. N.; Gangopadhyay, Sumona S.; Kothari, Harshit N.; Shelat, Foram A. Total electron scattering and ionization of \(N, N_{2}\) and metastable excited \(N^{\ast }_{2}(A^3\Sigma^+_{\mu})\): theoretical cross sections. (English) Zbl 1233.81035 Phys. Lett., A 373, No. 32, 2876-2881 (2009). MSC: 81U05 81U35 81V45 81V55 PDFBibTeX XMLCite \textit{K. N. Joshipura} et al., Phys. Lett., A 373, No. 32, 2876--2881 (2009; Zbl 1233.81035) Full Text: DOI
Alwen, Joël; Katz, Jonathan; Lindell, Yehuda; Persiano, Giuseppe; Shelat, Abhi; Visconti, Ivan Collusion-free multiparty computation in the mediated model. (English) Zbl 1252.94042 Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 524-540 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Alwen} et al., Lect. Notes Comput. Sci. 5677, 524--540 (2009; Zbl 1252.94042) Full Text: DOI
Micali, Silvio; Shelat, Abhi Purely rational secret sharing (extended abstract). (English) Zbl 1213.94159 Reingold, Omer (ed.), Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00456-8/pbk). Lecture Notes in Computer Science 5444, 54-71 (2009). MSC: 94A62 PDFBibTeX XMLCite \textit{S. Micali} and \textit{A. Shelat}, Lect. Notes Comput. Sci. 5444, 54--71 (2009; Zbl 1213.94159) Full Text: DOI
Camenisch, Jan; Chaabouni, Rafik; Shelat, Abhi Efficient protocols for set membership and range proofs. (English) Zbl 1206.94057 Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 234-252 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 5350, 234--252 (2008; Zbl 1206.94057) Full Text: DOI
Alwen, Joël; Shelat, Abhi; Visconti, Ivan Collusion-free protocols in the mediated model. (English) Zbl 1183.68079 Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 497-514 (2008). MSC: 68M12 68M14 94A62 PDFBibTeX XMLCite \textit{J. Alwen} et al., Lect. Notes Comput. Sci. 5157, 497--514 (2008; Zbl 1183.68079) Full Text: DOI
Cachin, Christian; Shelat, Abhi; Shraer, Alexander Efficient fork-linearizable access to untrusted shared memory. (English) Zbl 1283.68081 Proceedings of the 26th annual ACM symposium on principles of distributed computing, PODC ’07, Portland, OR, USA, August 12–15, 2007. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-59593-616-5). 129-138 (2007). MSC: 68M14 68M15 68W15 PDFBibTeX XMLCite \textit{C. Cachin} et al., in: Proceedings of the 26th annual ACM symposium on principles of distributed computing, PODC '07, Portland, OR, USA, August 12--15, 2007. New York, NY: Association for Computing Machinery (ACM). 129--138 (2007; Zbl 1283.68081) Full Text: DOI
Pass, Rafael; Shelat, Abhi; Vaikuntanathan, Vinod Relations among notions of non-malleability for encryption. (English) Zbl 1153.94420 Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 519-535 (2007). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{R. Pass} et al., Lect. Notes Comput. Sci. 4833, 519--535 (2007; Zbl 1153.94420) Full Text: DOI
Cramer, Ronald; Hanaoka, Goichiro; Hofheinz, Dennis; Imai, Hideki; Kiltz, Eike; Pass, Rafael; Shelat, Abhi; Vaikuntanathan, Vinod Bounded CCA2-secure encryption. (English) Zbl 1153.94363 Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 502-518 (2007). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Cramer} et al., Lect. Notes Comput. Sci. 4833, 502--518 (2007; Zbl 1153.94363) Full Text: DOI
Camenisch, Jan; Neven, Gregory; shelat, abhi Simulatable adaptive oblivious transfer. (English) Zbl 1141.94344 Naor, Moni (ed.), Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). Lecture Notes in Computer Science 4515, 573-590 (2007). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 4515, 573--590 (2007; Zbl 1141.94344) Full Text: DOI
Hohenberger, Susan; Rothblum, Guy N.; Shelat, Abhi; Vaikuntanathan, Vinod Securely obfuscating re-encryption. (English) Zbl 1129.94027 Vadhan, Salil P. (ed.), Theory of cryptography. 4th theory of cryptography conference, TCC 2007, Amsterdam, The Netherlands, February 21–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-70935-0/pbk). Lecture Notes in Computer Science 4392, 233-252 (2007). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. Hohenberger} et al., Lect. Notes Comput. Sci. 4392, 233--252 (2007; Zbl 1129.94027) Full Text: DOI
Pass, Rafael; Shelat, Abhi; Vaikuntanathan, Vinod Construction of a non-malleable encryption scheme from any semantically secure one. (English) Zbl 1161.94424 Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 271-289 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Pass} et al., Lect. Notes Comput. Sci. 4117, 271--289 (2006; Zbl 1161.94424) Full Text: DOI
Lepinksi, Matt; Micali, Silvio; Shelat, Abhi Collusion-free protocols. (English) Zbl 1192.94122 STOC’05: Proceedings of the 37th annual ACM symposium on theory of computing, Baltimore, MD, USA, May 22–24, 2005. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-960-8). 543-552 (2005). MSC: 94A62 68M12 PDFBibTeX XMLCite \textit{M. Lepinksi} et al., in: Proceedings of the 37th annual ACM symposium on theory of computing, STOC'05. Baltimore, MD, USA, May 22--24, 2005. New York, NY: Association for Computing Machinery (ACM). 543--552 (2005; Zbl 1192.94122) Full Text: DOI
Charikar, Moses; Lehman, Eric; Liu, Ding; Panigrahy, Rina; Prabhakaran, Manoj; Sahai, Amit; Shelat, Abhi The smallest grammar problem. (English) Zbl 1296.68086 IEEE Trans. Inf. Theory 51, No. 7, 2554-2576 (2005). MSC: 68Q42 68W25 68P30 PDFBibTeX XMLCite \textit{M. Charikar} et al., IEEE Trans. Inf. Theory 51, No. 7, 2554--2576 (2005; Zbl 1296.68086) Full Text: DOI
Pass, Rafael; Shelat, Abhi Unconditional characterizations of non-interactive zero-knowledge. (English) Zbl 1145.94473 Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 118-134 (2005). MSC: 94A62 PDFBibTeX XMLCite \textit{R. Pass} and \textit{A. Shelat}, Lect. Notes Comput. Sci. 3621, 118--134 (2005; Zbl 1145.94473) Full Text: DOI
Lepinski, Matt; Micali, Silvio; Shelat, Abhi Fair-zero knowledge. (English) Zbl 1079.94558 Kilian, Joe (ed.), Theory of cryptography. Second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24573-1/pbk). Lecture Notes in Computer Science 3378, 245-263 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Lepinski} et al., Lect. Notes Comput. Sci. 3378, 245--263 (2005; Zbl 1079.94558) Full Text: DOI
Lepinski, Matt; Micali, Silvio; Peikert, Chris; Shelat, Abhi Completely fair SFE and coalition-safe cheap talk. (English) Zbl 1321.94072 Proceedings of the 23rd annual ACM symposium on principles of distributed computing, PODC ’04, St. Johns, Newfoundland, Canada, July 25–28, 2004. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-802-4). 1-10 (2004). MSC: 94A60 91A80 91B26 PDFBibTeX XMLCite \textit{M. Lepinski} et al., in: Proceedings of the 23rd annual ACM symposium on principles of distributed computing, PODC '04, St. Johns, Newfoundland, Canada, July 25--28, 2004. New York, NY: Association for Computing Machinery (ACM). 1--10 (2004; Zbl 1321.94072) Full Text: DOI
Peikert, Chris; Shelat, Abhi; Smith, Adam Lower bounds for collusion-secure fingerprinting. (English) Zbl 1092.68605 Proceedings of the fourteenth annual ACM-SIAM symposium on discrete algorithms, Baltimore, MD, USA, January 12–14, 2003. New York, NY: Association for Computing Machinery; Philadelphia, PA: Society for Industrial and Applied Mathematics (ISBN 0-89871-538-5/pbk). 472-479 (2003). MSC: 68P25 PDFBibTeX XMLCite \textit{C. Peikert} et al., in: Proceedings of the fourteenth annual ACM-SIAM symposium on discrete algorithms, SODA 2003, Baltimore, MD, USA, January 12--14, 2003. New York, NY: Association for Computing Machinery; Philadelphia, PA: Society for Industrial and Applied Mathematics. 472--479 (2003; Zbl 1092.68605)
Charikar, Moses; Lehman, Eric; Liu, Ding; Panigrahy Rina; Prabhakaran, Manoj; Rasala, April; Sahai, Amit; Shelat, Abhi Approximating the smallest grammar: Kolmogorov complexity in natural models. (English) Zbl 1192.68397 Proceedings of the thirty-fourth annual ACM symposium on theory of computing (STOC 2002), Montreal, Quebec, Canada, May 19–21, 2002. New York, NY: ACM Press (ISBN 1-581-13495-9). 792-801, electronic only (2002). MSC: 68Q42 68Q30 PDFBibTeX XMLCite \textit{M. Charikar} et al., in: Proceedings of the thirty-fourth annual ACM symposium on theory of computing, STOC 2002. Montreal, Quebec, Canada, May 19--21, 2002. New York, NY: ACM Press. 792--801 (2002; Zbl 1192.68397) Full Text: DOI
Lehman, Eric; Shelat, Abhi Approximation algorithms for grammar-based compression. (English) Zbl 1093.68593 Proceedings of the thirteenth annual ACM-SIAM symposium on discrete algorithms, San Francisco, CA, USA, January 6–8, 2002. Philadelphia, PA: Society for Industrial and Applied Mathematics (SIAM) (ISBN 0-89871-513-X/pbk). 205-212 (2002). MSC: 68P30 PDFBibTeX XMLCite \textit{E. Lehman} and \textit{A. Shelat}, in: Proceedings of the thirteenth annual ACM-SIAM symposium on discrete algorithms, SODA 2002, San Francisco, CA, USA, January 6--8, 2002. Philadelphia, PA: Society for Industrial and Applied Mathematics (SIAM). 205--212 (2002; Zbl 1093.68593)