Yael Tauman Kalai

From MaRDI portal
Person:421035

Available identifiers

zbMath Open tauman-kalai.yaelWikidataQ56065688 ScholiaQ56065688MaRDI QIDQ421035

List of research outcomes

PublicationDate of PublicationType
SNARGs for monotone policy batch NP2024-02-02Paper
SNARGs and PPAD hardness from the decisional Diffie-Hellman assumption2023-12-08Paper
Circuits resilient to short-circuit errors2023-12-08Paper
Interactive error correcting codes over binary erasure channels resilient to > ½ adversarial corruption2023-12-08Paper
SNARGs for bounded depth computations and PPAD hardness from sub-exponential LWE2023-11-14Paper
Verifiable private information retrieval2023-08-14Paper
Constructive post-quantum reductions2023-06-30Paper
Succinct classical verification of quantum computation2023-06-28Paper
Somewhere statistical soundness, post-quantum security, and SNARGs2023-03-31Paper
https://portal.mardi4nfdi.de/entity/Q58757002023-02-03Paper
Delegation with updatable unambiguous proofs and PPAD-hardness2022-12-07Paper
Efficient Multiparty Interactive Coding—Part II: Non-Oblivious Noise2022-07-13Paper
How to Delegate Computations: The Power of No-Signaling Proofs2022-03-31Paper
Low error efficient computational extractors in the CRS model2021-12-01Paper
A lower bound for adaptively-secure collective coin flipping protocols2021-09-22Paper
Efficient Multiparty Interactive Coding—Part I: Oblivious Insertions, Deletions and Substitutions2021-07-23Paper
Efficient Multiparty Interactive Coding for Insertions, Deletions, and Substitutions2021-01-20Paper
Non-signaling proofs with o(√ log n) provers are in PSPACE2021-01-19Paper
DELEGATING COMPUTATION VIA NO-SIGNALING STRATEGIES2020-09-22Paper
Fully homomorphic NIZK and NIWI proofs2020-04-30Paper
Non-interactive non-malleability from quantum supremacy2020-03-09Paper
How to delegate computations publicly2020-01-30Paper
Multi-collision resistance: a paradigm for keyless hash functions2019-08-22Paper
Succinct delegation for low-space non-deterministic computation2019-08-22Paper
Promise zero knowledge and its applications to round optimal MPC2018-09-26Paper
Compressing communication in distributed protocols2018-08-24Paper
Delegating Computation2018-08-02Paper
Statistical witness indistinguishability (and more) in two messages2018-07-17Paper
Succinct spooky free compilers are not black box sound2018-02-23Paper
On virtual grey box obfuscation for general circuits2018-01-05Paper
Distinguisher-dependent simulation in two rounds and its applications2017-11-15Paper
From obfuscation to the security of Fiat-Shamir for proofs2017-11-15Paper
Interactive Coding for Multiparty Protocols2017-05-19Paper
On the Space Complexity of Linear Programming with Preprocessing2016-04-15Paper
Cryptographic Assumptions: A Position Paper2016-03-23Paper
Arguments of Proximity2015-12-10Paper
Adaptively Secure Coin-Flipping, Revisited2015-11-04Paper
Fast Interactive Coding against Adversarial Noise2015-08-14Paper
On Obfuscation with Random Oracles2015-07-06Paper
How to delegate computations2015-06-26Paper
On cryptography with auxiliary input2015-02-04Paper
The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator2014-08-07Paper
On Virtual Grey Box Obfuscation for General Circuits2014-08-07Paper
Delegation for bounded space2014-08-07Paper
Leakage-resilient coin tossing2014-07-11Paper
Protecting Obfuscation against Algebraic Attacks2014-05-27Paper
Multiparty computation secure against continual memory leakage2014-05-13Paper
Obfuscation for Evasive Functions2014-02-18Paper
Securing Circuits and Protocols against 1/poly(k) Tampering Rate2014-02-18Paper
How to Run Turing Machines on Encrypted Data2013-09-17Paper
Secure Computation against Adaptive Auxiliary Information2013-09-02Paper
Why “Fiat-Shamir for Proofs” Lacks a Proof2013-03-18Paper
Securing Circuits against Constant-Rate Tampering2012-09-25Paper
A Parallel Repetition Theorem for Leakage Resilience2012-06-15Paper
Smooth projective hashing and two-message oblivious transfer2012-05-23Paper
Program Obfuscation with Leaky Hardware2011-12-02Paper
Leakage-Resilient Coin Tossing2011-10-28Paper
Memory Delegation2011-08-12Paper
Cryptography with Tamperable and Leaky Memory2011-08-12Paper
Black-Box Circular-Secure Encryption beyond Affine Functions2011-05-19Paper
Concurrent general composition of secure protocols in the timing model2010-08-16Paper
On Symmetric Encryption and Point Obfuscation2010-02-24Paper
Public-Key Encryption Schemes with Auxiliary Inputs2010-02-24Paper
Probabilistically Checkable Arguments2009-10-20Paper
One-Time Programs2009-02-10Paper
https://portal.mardi4nfdi.de/entity/Q35496912009-01-05Paper
Interactive PCP2008-08-19Paper
Smooth Projective Hashing and Two-Message Oblivious Transfer2008-05-06Paper
Concurrent composition of secure protocols in the timing model2007-12-06Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Yael Tauman Kalai