Yael Tauman Kalai

From MaRDI portal
Person:421035

Available identifiers

zbMath Open tauman-kalai.yaelDBLPk/YaelTaumanKalaiWikidataQ56065688 ScholiaQ56065688MaRDI QIDQ421035

List of research outcomes





PublicationDate of PublicationType
Interactive coding with small memory2024-05-14Paper
SNARGs for monotone policy batch NP2024-02-02Paper
SNARGs and PPAD hardness from the decisional Diffie-Hellman assumption2023-12-08Paper
Circuits resilient to short-circuit errors2023-12-08Paper
Interactive error correcting codes over binary erasure channels resilient to > ½ adversarial corruption2023-12-08Paper
SNARGs for bounded depth computations and PPAD hardness from sub-exponential LWE2023-11-14Paper
Verifiable private information retrieval2023-08-14Paper
Constructive post-quantum reductions2023-06-30Paper
Succinct classical verification of quantum computation2023-06-28Paper
Somewhere statistical soundness, post-quantum security, and SNARGs2023-03-31Paper
https://portal.mardi4nfdi.de/entity/Q58757002023-02-03Paper
Delegation with updatable unambiguous proofs and PPAD-hardness2022-12-07Paper
Efficient Multiparty Interactive Coding—Part II: Non-Oblivious Noise2022-07-13Paper
How to Delegate Computations: The Power of No-Signaling Proofs2022-03-31Paper
Low error efficient computational extractors in the CRS model2021-12-01Paper
A lower bound for adaptively-secure collective coin flipping protocols2021-09-22Paper
Efficient Multiparty Interactive Coding—Part I: Oblivious Insertions, Deletions and Substitutions2021-07-23Paper
Efficient Multiparty Interactive Coding for Insertions, Deletions, and Substitutions2021-01-20Paper
Non-signaling proofs with o(√ log n) provers are in PSPACE2021-01-19Paper
DELEGATING COMPUTATION VIA NO-SIGNALING STRATEGIES2020-09-22Paper
Fully homomorphic NIZK and NIWI proofs2020-04-30Paper
Non-interactive non-malleability from quantum supremacy2020-03-09Paper
How to delegate computations publicly2020-01-30Paper
Multi-collision resistance: a paradigm for keyless hash functions2019-08-22Paper
Succinct delegation for low-space non-deterministic computation2019-08-22Paper
Promise zero knowledge and its applications to round optimal MPC2018-09-26Paper
Compressing communication in distributed protocols2018-08-24Paper
Delegating Computation2018-08-02Paper
Statistical witness indistinguishability (and more) in two messages2018-07-17Paper
Succinct spooky free compilers are not black box sound2018-02-23Paper
On virtual grey box obfuscation for general circuits2018-01-05Paper
Distinguisher-dependent simulation in two rounds and its applications2017-11-15Paper
From obfuscation to the security of Fiat-Shamir for proofs2017-11-15Paper
Interactive Coding for Multiparty Protocols2017-05-19Paper
On the space complexity of linear programming with preprocessing2016-04-15Paper
Cryptographic Assumptions: A Position Paper2016-03-23Paper
Arguments of Proximity2015-12-10Paper
Adaptively Secure Coin-Flipping, Revisited2015-11-04Paper
Fast Interactive Coding against Adversarial Noise2015-08-14Paper
On Obfuscation with Random Oracles2015-07-06Paper
How to delegate computations2015-06-26Paper
On cryptography with auxiliary input2015-02-04Paper
On Virtual Grey Box Obfuscation for General Circuits2014-08-07Paper
The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator2014-08-07Paper
Delegation for bounded space2014-08-07Paper
Leakage-resilient coin tossing2014-07-11Paper
Protecting Obfuscation against Algebraic Attacks2014-05-27Paper
Multiparty computation secure against continual memory leakage2014-05-13Paper
Securing Circuits and Protocols against 1/poly(k) Tampering Rate2014-02-18Paper
Obfuscation for Evasive Functions2014-02-18Paper
How to Run Turing Machines on Encrypted Data2013-09-17Paper
Secure Computation against Adaptive Auxiliary Information2013-09-02Paper
Why “Fiat-Shamir for Proofs” Lacks a Proof2013-03-18Paper
Securing Circuits against Constant-Rate Tampering2012-09-25Paper
A Parallel Repetition Theorem for Leakage Resilience2012-06-15Paper
Smooth projective hashing and two-message oblivious transfer2012-05-23Paper
Program Obfuscation with Leaky Hardware2011-12-02Paper
Leakage-Resilient Coin Tossing2011-10-28Paper
Memory Delegation2011-08-12Paper
Cryptography with Tamperable and Leaky Memory2011-08-12Paper
Black-Box Circular-Secure Encryption beyond Affine Functions2011-05-19Paper
Concurrent general composition of secure protocols in the timing model2010-08-16Paper
Public-Key Encryption Schemes with Auxiliary Inputs2010-02-24Paper
On Symmetric Encryption and Point Obfuscation2010-02-24Paper
Probabilistically Checkable Arguments2009-10-20Paper
One-Time Programs2009-02-10Paper
https://portal.mardi4nfdi.de/entity/Q35496912009-01-05Paper
Interactive PCP2008-08-19Paper
Smooth Projective Hashing and Two-Message Oblivious Transfer2008-05-06Paper
Concurrent composition of secure protocols in the timing model2007-12-06Paper

Research outcomes over time

This page was built for person: Yael Tauman Kalai