Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Adam Smith
Search web for home page
Program Committees
1
2011
Crypto
pc
2
2010
TCC
pc
3
2009
Crypto
pc
4
2008
Crypto
pc
5
2007
Crypto
pc
6
2006
TCC
pc
7
2005
Crypto
pc
Publications
year
title
booktitle
pages
1
2011
Classical Cryptographic Protocols in a Quantum World
crypto
405
2
2010
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
eprint
online
3
2010
Parallel and Concurrent Security of the HB and HB
+
Protocols
jofc
402-421
4
2010
Instantiability of RSA-OAEP under Chosen-Plaintext Attack
crypto
295-313
5
2009
Composability and On-Line Deniability of Authentication
tcc
146-162
6
2008
Scalable Multiparty Computation with Nearly Optimal Work and Resilience
crypto
241-261
7
2008
A Note on Differential Privacy: Defining Resistance to Arbitrary Side Information
eprint
online
8
2008
Efficient Two Party and Multi Party Computation Against Covert Adversaries
eurocrypt
289-306
9
2006
Scrambling Adversarial Errors Using Few Random Bits, Optimal Information Reconciliation, and Better Private Codes
eprint
online
10
2006
Analyzing the HB and HB+ Protocols in the ``Large Error'' Case
eprint
online
11
2006
Calibrating Noise to Sensitivity in Private Data Analysis
tcc
online
12
2006
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
crypto
online
13
2006
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
crypto
online
14
2006
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
eprint
online
15
2005
Toward Privacy in Public Databases
tcc
online
16
2005
Secure Remote Authentication Using Biometric Data
eurocrypt
online
17
2005
Entropic Security and the Encryption of High Entropy Messages
tcc
online
18
2005
Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes
eurocrypt
online
19
2004
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
eurocrypt
online
20
2004
List-Decoding of Linear Functions and Analysis of a Two-Round Zero-Knowledge Argument
tcc
101-120
21
2004
Efficient Consistency Proofs for Generalized Queries on a Committed Database
eprint
online
22
2004
Entropic Security and the Encryption of High Entropy Messages
eprint
online
23
2003
Round Efficiency of Multi-party Computation with a Dishonest Majority
eurocrypt
online
24
2003
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
eprint
online
25
2002
Authentication of Quantum Messages
eprint
online
26
2001
On Perfect and Adaptive Security in Exposure-Resilient Cryptography
eurocrypt
301-324
27
2001
Mutually Independent Commitments
asiacrypt
385-401
28
2001
Efficient and Non-Interactive Non-Malleable Commitment
eprint
online
29
2001
Efficient and Non-interactive Non-malleable Commitment
eurocrypt
40-59
Coauthors of Adam Smith
Howard Barnum
Xavier Boyen
Shuchi Chawla
Claude Crépeau
Giovanni Di Crescenzo
Ivan Damgård
Yevgeniy Dodis
Cynthia Dwork
Daniel Gottesman
Vipul Goyal
Sean Hallgren
Yuval Ishai
Shiva Prasad Kasiviswanathan
Jonathan Katz
Eike Kiltz
Mikkel Krøigaard
Moses Liskov
Anna Lysyanskaya
Frank McSherry
Silvio Micali
Payman Mohassel
Moni Naor
Jesper Buus Nielsen
Kobbi Nissim
Adam O'Neill
Rafail Ostrovsky
Charles Rackoff
Leonid Reyzin
Amit Sahai
Gil Segev
Ronen Shaltiel
Ji Sun Shin
Fang Song
Alain Tapp
Luca Trevisan
Shabsi Walfish
Hoeteck Wee