Yael Tauman Kalai

From MaRDI portal
(Redirected from Person:421035)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Interactive coding with small memory2024-05-14Paper
SNARGs for monotone policy batch NP
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
SNARGs and PPAD hardness from the decisional Diffie-Hellman assumption
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Circuits resilient to short-circuit errors
Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing
2023-12-08Paper
Interactive error correcting codes over binary erasure channels resilient to > ½ adversarial corruption
Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing
2023-12-08Paper
SNARGs for bounded depth computations and PPAD hardness from sub-exponential LWE
Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing
2023-11-14Paper
Verifiable private information retrieval
Theory of Cryptography
2023-08-14Paper
Constructive post-quantum reductions
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
Succinct classical verification of quantum computation
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Succinct classical verification of quantum computation
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Somewhere statistical soundness, post-quantum security, and SNARGs2023-03-31Paper
scientific article; zbMATH DE number 7650355 (Why is no real title available?)2023-02-03Paper
Delegation with updatable unambiguous proofs and PPAD-hardness2022-12-07Paper
Efficient Multiparty Interactive Coding—Part II: Non-Oblivious Noise
IEEE Transactions on Information Theory
2022-07-13Paper
How to Delegate Computations: The Power of No-Signaling Proofs
Journal of the ACM
2022-03-31Paper
Low error efficient computational extractors in the CRS model2021-12-01Paper
A lower bound for adaptively-secure collective coin flipping protocols
Combinatorica
2021-09-22Paper
Efficient Multiparty Interactive Coding—Part I: Oblivious Insertions, Deletions and Substitutions
IEEE Transactions on Information Theory
2021-07-23Paper
Efficient Multiparty Interactive Coding for Insertions, Deletions, and Substitutions
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing
2021-01-20Paper
Non-signaling proofs with o(√ log n) provers are in PSPACE
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing
2021-01-19Paper
DELEGATING COMPUTATION VIA NO-SIGNALING STRATEGIES
Proceedings of the International Congress of Mathematicians (ICM 2018)
2020-09-22Paper
Fully homomorphic NIZK and NIWI proofs2020-04-30Paper
Non-interactive non-malleability from quantum supremacy2020-03-09Paper
How to delegate computations publicly
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing
2020-01-30Paper
Multi-collision resistance: a paradigm for keyless hash functions
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing
2019-08-22Paper
Succinct delegation for low-space non-deterministic computation
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing
2019-08-22Paper
Promise zero knowledge and its applications to round optimal MPC2018-09-26Paper
Compressing communication in distributed protocols
(available as arXiv preprint)
2018-08-24Paper
Delegating computation: interactive proofs for muggles
Journal of the ACM
2018-08-02Paper
Statistical witness indistinguishability (and more) in two messages2018-07-17Paper
Succinct spooky free compilers are not black box sound2018-02-23Paper
On virtual grey box obfuscation for general circuits
Algorithmica
2018-01-05Paper
Distinguisher-dependent simulation in two rounds and its applications2017-11-15Paper
From obfuscation to the security of Fiat-Shamir for proofs2017-11-15Paper
Interactive coding for multiparty protocols
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science
2017-05-19Paper
On the space complexity of linear programming with preprocessing
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science
2016-04-15Paper
Cryptographic assumptions: a position paper
Theory of Cryptography
2016-03-23Paper
Arguments of proximity (extended abstract)
Lecture Notes in Computer Science
2015-12-10Paper
Adaptively secure coin-flipping, revisited
Automata, Languages, and Programming
2015-11-04Paper
Fast interactive coding against adversarial noise
Journal of the ACM
2015-08-14Paper
On obfuscation with random oracles
Theory of Cryptography
2015-07-06Paper
How to delegate computations
Proceedings of the forty-sixth annual ACM symposium on Theory of computing
2015-06-26Paper
On cryptography with auxiliary input
Proceedings of the forty-first annual ACM symposium on Theory of computing
2015-02-04Paper
On virtual grey box obfuscation for general circuits
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
The impossibility of obfuscation with auxiliary input or a universal simulator
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Delegation for bounded space
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2014-08-07Paper
Leakage-resilient coin tossing
Distributed Computing
2014-07-11Paper
Protecting obfuscation against algebraic attacks
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Multiparty computation secure against continual memory leakage
Proceedings of the forty-fourth annual ACM symposium on Theory of computing
2014-05-13Paper
Securing circuits and protocols against \(1/\mathrm{poly}(k)\) tampering rate
Theory of Cryptography
2014-02-18Paper
Obfuscation for evasive functions
Theory of Cryptography
2014-02-18Paper
How to run Turing machines on encrypted data
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Secure computation against adaptive auxiliary information
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Why ``Fiat-Shamir for proofs lacks a proof
Theory of Cryptography
2013-03-18Paper
Securing circuits against constant-rate tampering
Lecture Notes in Computer Science
2012-09-25Paper
A parallel repetition theorem for leakage resilience
Theory of Cryptography
2012-06-15Paper
Smooth projective hashing and two-message oblivious transfer
Journal of Cryptology
2012-05-23Paper
Program obfuscation with leaky hardware
Lecture Notes in Computer Science
2011-12-02Paper
Leakage-Resilient Coin Tossing
Lecture Notes in Computer Science
2011-10-28Paper
Memory delegation
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Cryptography with tamperable and leaky memory
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Black-box circular-secure encryption beyond affine functions
Theory of Cryptography
2011-05-19Paper
Concurrent general composition of secure protocols in the timing model
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
2010-08-16Paper
Public-key encryption schemes with auxiliary inputs
Theory of Cryptography
2010-02-24Paper
On symmetric encryption and point obfuscation
Theory of Cryptography
2010-02-24Paper
Probabilistically Checkable Arguments
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
One-Time Programs
Lecture Notes in Computer Science
2009-02-10Paper
scientific article; zbMATH DE number 5485522 (Why is no real title available?)2009-01-05Paper
Interactive PCP
Automata, Languages and Programming
2008-08-19Paper
Smooth Projective Hashing and Two-Message Oblivious Transfer
Lecture Notes in Computer Science
2008-05-06Paper
Concurrent composition of secure protocols in the timing model
Journal of Cryptology
2007-12-06Paper


Research outcomes over time


This page was built for person: Yael Tauman Kalai