Person:383730: Difference between revisions

From MaRDI portal
Person:383730
Created automatically from import230924090903
 
m AuthorDisambiguator moved page Salil P. Vadhan to Salil P. Vadhan: Duplicate
 
(No difference)

Latest revision as of 04:40, 9 December 2023

Available identifiers

zbMath Open vadhan.salil-pMaRDI QIDQ383730

List of research outcomes

PublicationDate of PublicationType
Pseudorandom Generators for Read-Once Monotone Branching Programs2023-11-20Paper
Canonical noise distributions and private hypothesis tests2023-07-19Paper
Pseudodistributions that beat all pseudorandom generators (extended abstract)2023-07-12Paper
Concurrent composition of differential privacy2023-04-13Paper
Limitations of the Impagliazzo-Nisan-Wigderson pseudorandom generator against permutation branching programs2023-03-30Paper
https://portal.mardi4nfdi.de/entity/Q58754982023-02-03Paper
Derandomization beyond Connectivity: Undirected Laplacian Systems in Nearly Logarithmic Space2022-08-17Paper
Concurrent Composition Theorems for Differential Privacy2022-07-17Paper
When Simple Hash Functions Suffice2022-02-04Paper
The Many Entropies in One-Way Functions2022-01-12Paper
The Complexity of Differential Privacy2022-01-12Paper
https://portal.mardi4nfdi.de/entity/Q51584982021-10-25Paper
Differential Privacy on Finite Computers2021-06-15Paper
Finite Sample Differentially Private Confidence Intervals2021-06-15Paper
https://portal.mardi4nfdi.de/entity/Q51408422020-12-17Paper
PCPs and the hardness of generating synthetic data2020-11-06Paper
https://portal.mardi4nfdi.de/entity/Q51219112020-09-22Paper
Unifying computational entropies via Kullback-Leibler divergence2020-03-09Paper
Fingerprinting Codes and the Price of Approximate Differential Privacy2018-11-07Paper
Deterministic public-key encryption for adaptively-chosen plaintext distributions2018-11-01Paper
https://portal.mardi4nfdi.de/entity/Q45681122018-06-15Paper
https://portal.mardi4nfdi.de/entity/Q45913722017-11-14Paper
A Lower Bound on List Size for List Decoding2017-07-27Paper
Locally testable codes and cayley graphs2017-05-19Paper
Redrawing the boundaries on purchasing data from privacy-sensitive individuals2017-05-19Paper
Publicly verifiable proofs of sequential work2017-05-16Paper
https://portal.mardi4nfdi.de/entity/Q29696692017-03-22Paper
Separating Computational and Statistical Differential Privacy in the Client-Server Model2016-12-21Paper
Extracting all the randomness and reducing the error in Trevisan's extractors2016-09-29Paper
Pseudorandom generators without the XOR Lemma (extended abstract)2016-09-29Paper
The Complexity of Computing the Optimal Composition of Differential Privacy2016-03-23Paper
A complete problem for statistical zero knowledge2015-12-07Paper
Unbalanced expanders and randomness extractors from Parvaresh--Vardy codes2015-11-11Paper
The Computational Complexity of Nash Equilibria in Concisely Represented Games2015-09-24Paper
Fingerprinting codes and the price of approximate differential privacy2015-06-26Paper
On the complexity of differentially private data release2015-02-04Paper
Inaccessible entropy2015-02-04Paper
Privacy Games2015-01-07Paper
Deterministic extractors for small-space sources2014-11-25Paper
Zero knowledge with efficient provers2014-11-25Paper
Pseudorandom walks on regular digraphs and the RL vs. L problem2014-11-25Paper
https://portal.mardi4nfdi.de/entity/Q31916002014-10-06Paper
On transformation of interactive proofs that preserve the prover's complexity2014-09-26Paper
S-T connectivity on digraphs with a known stationary distribution2014-09-09Paper
Efficiency improvements in constructing pseudorandom generators from one-way functions2014-08-13Paper
Interactive proofs of proximity2014-08-07Paper
Characterizing pseudoentropy and simplifying pseudorandom generator constructions2014-05-13Paper
On the (im)possibility of obfuscating programs2014-02-17Paper
Pseudorandomness2014-01-03Paper
A study of statistical zero-knowledge proofs (to appear)2013-12-05Paper
Pseudorandomness for Regular Branching Programs via Fourier Analysis2013-10-04Paper
Efficiency Improvements in Constructing Pseudorandom Generators from One-Way Functions2013-09-25Paper
A Uniform Min-Max Theorem with Applications in Cryptography2013-09-02Paper
Faster Algorithms for Privately Releasing Marginals2013-08-12Paper
Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions2013-05-31Paper
On extractors and exposure‐resilient functions for sublogarithmic entropy2013-05-28Paper
Differential Privacy with Imperfect Randomness2012-09-25Paper
Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources2012-06-15Paper
https://portal.mardi4nfdi.de/entity/Q30967152011-11-11Paper
Simplified Derandomization of BPP Using a Hitting Set Generator2011-08-19Paper
On the Complexity of Computational Problems Regarding Distributions2011-08-19Paper
Time-Lock Puzzles in the Random Oracle Model2011-08-12Paper
PCPs and the Hardness of Generating Private Synthetic Data2011-05-19Paper
Are PCPs inherent in efficient arguments?2011-02-18Paper
Deterministic extractors for small-space sources2011-01-18Paper
Improved Delegation of Computation Using Fully Homomorphic Encryption2010-08-24Paper
Extractors2010-08-16Paper
Randomness-efficient low degree tests and short PCPs via epsilon-biased sets2010-08-16Paper
The round complexity of two-party random selection2010-08-16Paper
Robust pcps of proximity, shorter pcps and applications to coding2010-08-15Paper
Using nondeterminism to amplify hardness2010-08-15Paper
https://portal.mardi4nfdi.de/entity/Q35794082010-08-06Paper
Randomness conductors and constant-degree lossless expanders2010-08-05Paper
Statistically Hiding Commitments and Statistical Zero-Knowledge Arguments from Any One-Way Function2010-07-07Paper
Universal One-Way Hash Functions via Inaccessible Entropy2010-06-01Paper
Composition of Zero-Knowledge Proofs with Efficient Provers2010-02-24Paper
The hardness of the expected decision depth problem2010-01-29Paper
Pseudorandom Bit Generators That Fool Modular Sums2009-10-28Paper
Computational Differential Privacy2009-10-20Paper
Theory of Cryptography2009-05-14Paper
Theory of Cryptography2009-05-14Paper
The Round Complexity of Two-Party Random Selection2009-04-30Paper
Amplifying Collision Resistance: A Complexity-Theoretic Treatment2009-03-10Paper
Fairness with an Honest Minority and a Rational Majority2009-03-03Paper
Proofs of Retrievability via Hardness Amplification2009-03-03Paper
The Complexity of Distinguishing Markov Random Fields2008-11-27Paper
Tight Bounds for Hashing Block Sources2008-11-27Paper
Limitations of Hardness vs. Randomness under Uniform Reductions2008-11-27Paper
New Proofs of the Green-Tao-Ziegler Dense Model Theorem: An Exposition2008-06-02Paper
The Complexity of Zero Knowledge2008-04-24Paper
Derandomization in Cryptography2008-04-22Paper
Simpler session-key generation from short random passwords2008-04-16Paper
Pseudorandomness and average-case complexity via uniform reductions2008-03-11Paper
An Equivalence Between Zero Knowledge and Commitments2008-03-05Paper
Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model2008-03-05Paper
Zero Knowledge and Soundness Are Symmetric2007-11-29Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Robust PCPs of Proximity, Shorter PCPs, and Applications to Coding2007-09-07Paper
An Unconditional Study of Computational Zero Knowledge2007-09-07Paper
Random Selection with an Adversarial Majority2007-09-04Paper
Theory of Cryptography2007-02-12Paper
Approximation, Randomization and Combinatorial Optimization. Algorithms and Techniques2006-07-07Paper
Approximation, Randomization and Combinatorial Optimization. Algorithms and Techniques2006-07-07Paper
Using Nondeterminism to Amplify Hardness2006-06-01Paper
Lower bounds for non-black-box zero knowledge2006-04-28Paper
Compression of samplable sources2006-02-08Paper
https://portal.mardi4nfdi.de/entity/Q46505742005-02-18Paper
Constructing locally computable extractors and cryptosystems in the bounded-storage model2004-09-22Paper
On interactive proofs with a laconic prover2003-11-17Paper
https://portal.mardi4nfdi.de/entity/Q44142702003-07-24Paper
Extracting all the randomness and reducing the error in Trevisan's extractors2003-05-04Paper
Pseudorandom generators without the XOR lemma2003-02-04Paper
https://portal.mardi4nfdi.de/entity/Q47837162002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q47807792002-11-21Paper
Entropy waves, the zig-zag graph product, and new constant-degree expanders2002-10-13Paper
https://portal.mardi4nfdi.de/entity/Q45425582002-09-17Paper
https://portal.mardi4nfdi.de/entity/Q45425622002-08-01Paper
https://portal.mardi4nfdi.de/entity/Q45350282002-06-12Paper
The Complexity of Counting in Sparse, Regular, and Planar Graphs2002-04-23Paper
https://portal.mardi4nfdi.de/entity/Q49418742000-08-27Paper
https://portal.mardi4nfdi.de/entity/Q42493371999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42249351999-01-17Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Salil P. Vadhan