Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Shafi Goldwasser
Search web for home page
Program Committees
1
2009
Crypto
pc
2
2005
Eurocrypt
pc
3
2005
TCC
general chair
4
2004
TCC
general chair
5
1997
Eurocrypt
pc
6
1991
Asiacrypt
pc
7
1988
Crypto
pc chair
8
1986
Crypto
pc
Publications
year
title
booktitle
pages
1
2012
Bounded-Collusion IBE from Key Homomorphism
tcc
564-581
2
2011
Program Obfuscation with Leaky Hardware
asiacrypt
722-739
3
2011
Black-Box Circular-Secure Encryption Beyond Affine Functions
tcc
201
4
2010
Public-Key Encryption Schemes with Auxiliary Inputs
tcc
361-381
5
2010
Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back)
eprint
online
6
2010
Securing Computation against Continuous Leakage
crypto
59-79
7
2010
Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability - (or: Quadratic Residuosity Strikes Back)
crypto
1-20
8
2009
Simultaneous Hardcore Bits and Cryptography against Memory Attacks
tcc
474-495
9
2009
Cryptography without (Hardly Any) Secrets ?
eurocrypt
369-370
10
2009
Weak Verifiable Random Functions
tcc
558-576
11
2008
How to Protect Yourself without Perfect Shredding
eprint
online
12
2008
One-Time Programs
crypto
39-56
13
2007
Secure Computation from Random Error Correcting Codes
eurocrypt
291-310
14
2007
On Best-Possible Obfuscation
tcc
194-213
15
2005
Secure Multi-Party Computation without Agreement
jofc
247-287
16
2005
Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem
tcc
online
17
2004
Transformation of Digital Signature Schemes into Designated Confirmer Signature Schemes
tcc
77-100
18
2003
On the (In)security of the Fiat-Shamir Paradigm
eprint
online
19
2002
Secure Computation Without Agreement
eprint
online
20
2001
Identification Protocols Secure against Reset Attacks
eurocrypt
495-511
21
2001
Resettably-Sound Zero-Knowledge and its Applications
eprint
online
22
2000
Identification Protocols Secure Against Reset Attacks
eprint
online
23
1999
Resettable Zero-Knowledge
eprint
online
24
1999
An Efficient
Threshold
Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack
eurocrypt
90-106
25
1998
On the possibility of basing Cryptography on the assumption that $P \neq NP$
eprint
online
26
1998
A Random Server Model for Private Information Retrieval (or How to Achieve Information Theoretic PIR Avoiding Data Replication)
eprint
online
27
1997
Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem
crypto
105-111
28
1997
Public-Key Cryptosystems from Lattice Reduction Problems
crypto
112-131
29
1997
"Pseudo-Random" Number Generation Within Cryptographic Algorithms: The DDS Case
crypto
277-291
30
1996
Collision-Free Hashing from Lattice Problems
eprint
online
31
1996
Verifiable Partial Key Escrow
eprint
online
32
1996
Public-Key Cryptosystems from Lattice Reduction Problems
eprint
online
33
1994
Incremental Cryptography: The Case of Hashing and Signing
crypto
216-233
34
1992
Invariant Signatures and Non-Interactive Zero-Knowledge Proofs are Equivalent (Extended Abstract)
crypto
228-245
35
1990
Fair Computation of General Functions in Presence of Immoral Majority
crypto
77-93
36
1989
On the Structure of Secret Key Exchange Protocols
crypto
604-605
37
1989
New Paradigms for Digital Signatures and Message Authentication Based on Non-Interative Zero Knowledge Proofs
crypto
194-211
38
1989
Efficient Identification Schemes Using Two Prover Interactive Proofs
crypto
498-506
39
1989
Multiparty Computation with Faulty Majority
crypto
589-590
40
1988
Everything Provable is Provable in Zero-Knowledge
crypto
37-56
41
1985
The Bit Security of Modular Squaring Given Partial Factorization of the Modulos
crypto
448-457
42
1984
On the Cryptographic Applications of Random Functions
crypto
276-288
43
1984
A "Paradoxical'"Solution to the Signature Problem (Abstract)
crypto
467
44
1984
An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information
crypto
289-302
45
1982
On Signatures and Authentication
crypto
211-215
Coauthors of Shafi Goldwasser
Adi Akavia
Boaz Barak
Donald Beaver
Mihir Bellare
Michael Ben-Or
Nir Bitansky
Manuel Blum
Zvika Brakerski
Ran Canetti
Hao Chen
Benny Chor
Lenore Cowen
Ronald Cramer
Yevgeniy Dodis
Dror Eiger
Marc Fischlin
Yael Gertner
Oded Goldreich
Robbert de Haan
Shai Halevi
Johan Håstad
Yael Tauman Kalai
Dmitriy Kharchenko
Joe Kilian
Leonid A. Levin
Allison B. Lewko
Dah-Yoh Lim
Yehuda Lindell
Tal Malkin
Silvio Micali
Daniele Micciancio
Rafail Ostrovsky
Chris Peikert
Ronald L. Rivest
Phillip Rogaway
Guy N. Rothblum
Yael Tauman
Vinod Vaikuntanathan
Erez Waisbard
Avi Wigderson
David A. Wilson
Andrew Chi-Chih Yao