Dana Dachman-Soled

From MaRDI portal
Person:785017

Available identifiers

zbMath Open dachman-soled.danaMaRDI QIDQ785017

List of research outcomes





PublicationDate of PublicationType
Revisiting security estimation for LWE with hints from a geometric perspective2024-02-06Paper
Secure sampling with sublinear communication2023-08-14Paper
(Nondeterministic) hardness vs. non-malleability2023-06-12Paper
BKW meets Fourier new algorithms for LPN with sparse parities2023-04-13Paper
https://portal.mardi4nfdi.de/entity/Q58757872023-02-03Paper
New techniques for zero-knowledge: leveraging inefficient provers to reduce assumptions, interaction, and trust2022-12-07Paper
LWE with side information: attacks and concrete security estimation2022-11-09Paper
Non-malleable codes for bounded parallel-time tampering2022-04-22Paper
Revisiting fairness in MPC: polynomial number of parties and general adversarial structures2022-03-23Paper
(In)security of ring-LWE under partial key exposure2021-05-25Paper
Towards a ring analogue of the leftover hash lemma2021-05-25Paper
TMPS: ticket-mediated password strengthening2020-08-05Paper
Feasibility and infeasibility of secure computation with malicious PUFs2020-04-28Paper
Locally decodable and updatable non-malleable codes and their applications2020-03-03Paper
Constant-round group key exchange from the ring-LWE assumption2020-02-25Paper
Non-malleable codes against bounded polynomial time tampering2020-02-04Paper
Upper and lower bounds for continuous non-malleable codes2020-01-28Paper
Tight upper and lower bounds for leakage-resilient, locally decodable and updatable non-malleable codes2019-09-17Paper
Leakage resilience from program obfuscation2019-08-13Paper
Oblivious network RAM and leveraging parallelism to achieve obliviousness2019-08-13Paper
Non-malleable codes from average-case hardness: \({\mathsf{A}}{\mathsf{C}}^0\), decision trees, and streaming space-bounded tampering2018-07-17Paper
Local non-malleable codes in the bounded retrieval model2018-05-29Paper
A black-box construction of non-malleable encryption from semantically secure encryption2018-04-26Paper
Improved, black-box, non-malleable encryption from semantic security2018-04-06Paper
Approximate resilience, monotonicity, and the complexity of agnostic learning2017-10-05Paper
Tight upper and lower bounds for leakage-resilient, locally decodable and updatable non-malleable codes2017-06-13Paper
Towards non-black-box separations of public key encryption and one way function2016-12-22Paper
Non-malleable codes for bounded depth, bounded fan-in circuits2016-07-15Paper
10-round Feistel is indifferentiable from an ideal cipher2016-07-15Paper
Oblivious network RAM and leveraging parallelism to achieve obliviousness2016-06-10Paper
Leakage-resilient public-key encryption from obfuscation2016-04-13Paper
Efficient Concurrent Covert Computation of String Equality and Set Intersection2016-04-08Paper
Leakage-Resilient Circuits Revisited – Optimal Number of Computing Components Without Leak-Free Hardware2015-09-30Paper
Locally decodable and updatable non-malleable codes and their applications2015-07-06Paper
Adaptively secure, universally composable, multiparty computation in constant rounds2015-07-06Paper
Feasibility and infeasibility of secure computation with malicious PUFs2014-08-07Paper
Leakage-tolerant computation with input-independent preprocessing2014-08-07Paper
On minimal assumptions for sender-deniable public key encryption2014-03-25Paper
A black-box construction of a CCA2 encryption scheme from a plaintext aware (sPA1) encryption scheme2014-03-25Paper
Enhanced chosen-ciphertext security and applications2014-03-25Paper
Can optimally-fair coin tossing be based on one-way functions?2014-02-18Paper
Securing circuits and protocols against \(1/\mathrm{poly}(k)\) tampering rate2014-02-18Paper
Adaptive and concurrent secure computation from new adaptive, non-malleable commitments2013-12-10Paper
Why ``Fiat-Shamir for proofs lacks a proof2013-03-18Paper
Efficient robust private set intersection2012-11-16Paper
Securing circuits against constant-rate tampering2012-09-25Paper
On the centrality of off-line e-cash to concrete partial information games2012-09-25Paper
Efficient password authenticated key exchange via oblivious transfer2012-07-20Paper
Computational extractors and pseudorandomness2012-06-15Paper
A canonical form for testing Boolean function properties2011-08-17Paper
Optimal cryptographic hardness of learning monotone functions2011-05-24Paper
On the Black-Box Complexity of Optimally-Fair Coin Tossing2011-05-19Paper
Improved non-committing encryption with applications to adaptively secure protocols2009-12-15Paper
Simple, Black-Box Constructions of Adaptively Secure Protocols2009-03-03Paper
Optimal Cryptographic Hardness of Learning Monotone Functions2008-08-28Paper
Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One2008-03-05Paper

Research outcomes over time

This page was built for person: Dana Dachman-Soled