What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Elaine Shi
Google Scholar
118
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurocrypt
Quasi-Linear Indistinguishability Obfuscation via Mathematical Proofs of Equivalence and Applications.
Yaohua Ma
Chenxin Dai
Elaine Shi
2025
conf/eurocrypt
Pseudorandom Functions with Weak Programming Privacy and Applications to Private Information Retrieval.
Ashrujit Ghoshal
Mingxun Zhou
Elaine Shi
Bo Peng
2025
conf/crypto
PicoGRAM: Practical Garbled RAM from Decisional Diffie-Hellman.
Tianyao Gu
Afonso Tinoco
Sri Harish G. Rajan
Elaine Shi
2025
conf/crypto
Foundations of Platform-Assisted Auctions.
Hao Chung
Ke Wu
Elaine Shi
2025
conf/uss
Flexway O-Sort: Enclave-Friendly and Optimal Oblivious Sorting.
Tianyao Gu
Yilei Wang
Afonso Tinoco
Bingnan Chen
Ke Yi
Elaine Shi
2024
journals/popets
Efficient Privacy-Preserving Machine Learning with Lightweight Trusted Hardware.
Pengzhi Huang
Thang Hoang
Yueying Li
Elaine Shi
G. Edward Suh
2024
journals/popets
MicroSecAgg: Streamlined Single-Server Secure Aggregation.
Yue Guo
Antigoni Polychroniadou
Elaine Shi
David Byrd
Tucker Balch
2024
conf/ccs
Almost Instance-optimal Clipping for Summation Problems in the Shuffle Model of Differential Privacy.
Wei Dong
Qiyao Luo
Giulia Fanti
Elaine Shi
Ke Yi
2024
conf/ccs
Conan: Distributed Proofs of Compliance for Anonymous Data Collection.
Mingxun Zhou
Giulia Fanti
Elaine Shi
2024
conf/crypto
PIR with Client-Side Preprocessing: Information-Theoretic Constructions and Lower Bounds.
Yuval Ishai
Elaine Shi
Daniel Wichs
2024
conf/sp
Piano: Extremely Simple, Single-Server PIR with Sublinear Server Computation.
Mingxun Zhou
Andrew Park
Wenting Zheng
Elaine Shi
2024
conf/eurocrypt
Efficient Pre-processing PIR Without Public-Key Cryptography.
Ashrujit Ghoshal
Mingxun Zhou
Elaine Shi
2023
journals/joc
Oblivious RAM with Worst-Case Logarithmic Overhead.
Gilad Asharov
Ilan Komargodski
Wei-Kai Lin
Elaine Shi
2023
conf/uss
EnigMap: External-Memory Oblivious Map for Secure Enclaves.
Afonso Tinoco
Sixiang Gao
Elaine Shi
2023
conf/ndss
Efficient Dynamic Proof of Retrievability for Cold Storage.
Tung Le
Pengzhi Huang
Attila A. Yavuz
Elaine Shi
Thang Hoang
2023
conf/pkc
Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles.
Elaine Shi
Nikhil Vanjani
2023
conf/eurocrypt
A Theory of Composition for Differential Obliviousness.
Mingxun Zhou
Elaine Shi
T.-H. Hubert Chan
Shir Maimon
2023
conf/eurocrypt
NanoGRAM: Garbled RAM with $\widetilde{O}(\log N)$ Overhead.
Andrew Park
Wei-Kai Lin
Elaine Shi
2023
conf/eurocrypt
Optimal Single-Server Private Information Retrieval.
Mingxun Zhou
Wei-Kai Lin
Yiannis Tselekounis
Elaine Shi
2023
conf/tcc
Non-Interactive Anonymous Router with Quasi-Linear Router Computation.
Rex Fernando
Elaine Shi
Pratik Soni
Nikhil Vanjani
Brent Waters
2023
conf/tcc
Distributed-Prover Interactive Proofs.
Sourav Das
Rex Fernando
Ilan Komargodski
Elaine Shi
Pratik Soni
2022
journals/joc
Locality-Preserving Oblivious RAM.
Gilad Asharov
T.-H. Hubert Chan
Kartik Nayak
Rafael Pass
Ling Ren
Elaine Shi
2022
conf/uss
Polynomial Commitment with a One-to-Many Prover and Applications.
Jiaheng Zhang
Tiancheng Xie
Thang Hoang
Elaine Shi
Yupeng Zhang
2022
conf/crypto
Maliciously Secure Massively Parallel Computation for All-but-One Corruptions.
Rex Fernando
Yuval Gelles
Ilan Komargodski
Elaine Shi
2022
conf/crypto
log <sup>*</sup>-Round Game-Theoretically-Fair Leader Election.
Ilan Komargodski
Shin'ichiro Matsuo
Elaine Shi
Ke Wu
2022
conf/sp
Locally Differentially Private Sparse Vector Aggregation.
Mingxun Zhou
Tianhao Wang
T.-H. Hubert Chan
Giulia Fanti
Elaine Shi
2022
conf/eurocrypt
A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss.
Ke Wu
Gilad Asharov
Elaine Shi
2021
conf/crypto
Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwidth and Time.
Elaine Shi
Waqar Aqeel
Balakrishnan Chandrasekaran
Bruce M. Maggs
2021
conf/crypto
Game-Theoretic Fairness Meets Multi-party Protocols: The Case of Leader Election.
Kai-Min Chung
T.-H. Hubert Chan
Ting Wen
Elaine Shi
2021
conf/crypto
Oblivious RAM with Worst-Case Logarithmic Overhead.
Gilad Asharov
Ilan Komargodski
Wei-Kai Lin
Elaine Shi
2021
conf/fc
Selfish Mining Attacks Exacerbated by Elastic Hash Supply.
Yoko Shibuya
Go Yamamoto
Fuhito Kojima
Elaine Shi
Shin'ichiro Matsuo
Aron Laszka
2021
conf/asiaccs
Streamlet: An Absurdly Simple, Textbook Blockchain Protocol.
Elaine Shi
2021
conf/eurocrypt
Non-Interactive Anonymous Router.
Elaine Shi
Ke Wu
2020
journals/joc
Locally Decodable and Updatable Non-malleable Codes and Their Applications.
Dana Dachman-Soled
Feng-Hao Liu
Elaine Shi
Hong-Sheng Zhou
2020
conf/sp
Path Oblivious Heap: Optimal and Practical Oblivious Priority Queue.
Elaine Shi
2020
conf/pkc
Sublinear-Round Byzantine Agreement Under Corrupt Majority.
T.-H. Hubert Chan
Rafael Pass
Elaine Shi
2020
conf/eurocrypt
OptORAMa: Optimal Oblivious RAM.
Gilad Asharov
Ilan Komargodski
Wei-Kai Lin
Kartik Nayak
Enoch Peserico
Elaine Shi
2020
conf/asiacrypt
On the Adaptive Security of MACs and PRFs.
Andrew Morgan
Rafael Pass
Elaine Shi
2020
conf/tcc
Expected Constant Round Byzantine Broadcast Under Dishonest Majority.
Jun Wan
Hanshen Xiao
Elaine Shi
Srinivas Devadas
2020
conf/tcc
Secure Massively Parallel Computation for Dishonest Majority.
Rex Fernando
Ilan Komargodski
Yanyi Liu
Elaine Shi
2020
conf/tcc
Round-Efficient Byzantine Broadcast Under Strongly Adaptive and Majority Corruptions.
Jun Wan
Hanshen Xiao
Srinivas Devadas
Elaine Shi
2019
journals/joc
Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness.
Dana Dachman-Soled
Chang Liu
Charalampos Papamanthou
Elaine Shi
Uzi Vishkin
2019
conf/crypto
Synchronous, with a Chance of Partition Tolerance.
Yue Guo
Rafael Pass
Elaine Shi
2019
conf/fc
Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake.
Phil Daian
Rafael Pass
Elaine Shi
2019
conf/sp
Towards Automated Safety Vetting of PLC Code in Real-World Plants.
Mu Zhang
Chien-Ying Chen
Bin-Chou Kao
Yassine Qamsane
Yuru Shao
Yikai Lin
Elaine Shi
Sibin Mohan
Kira Barton
James R. Moyne
Z. Morley Mao
2019
conf/eurocrypt
Locality-Preserving Oblivious RAM.
Gilad Asharov
T.-H. Hubert Chan
Kartik Nayak
Rafael Pass
Ling Ren
Elaine Shi
2019
conf/eurocrypt
Consensus Through Herding.
T.-H. Hubert Chan
Rafael Pass
Elaine Shi
2019
conf/asiacrypt
Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey).
Elaine Shi
2019
conf/asiacrypt
Towards Attribute-Based Encryption for RAMs from LWE: Sub-linear Decryption, and More.
Prabhanjan Ananth
Xiong Fan
Elaine Shi
2018
conf/ccs
Symbolic Proofs for Lattice-Based Cryptography.
Gilles Barthe
Xiong Fan
Joshua Gancher
Benjamin Grégoire
Charlie Jacomme
Elaine Shi
2018
conf/sp
xJsnark: A Framework for Efficient Verifiable Computation.
Ahmed E. Kosba
Charalampos Papamanthou
Elaine Shi
2018
conf/eurocrypt
Thunderella: Blockchains with Optimistic Instant Confirmation.
Rafael Pass
Elaine Shi
2018
conf/asiacrypt
More is Less: Perfectly Secure Oblivious Algorithms in the Multi-server Setting.
T.-H. Hubert Chan
Jonathan Katz
Kartik Nayak
Antigoni Polychroniadou
Elaine Shi
2018
conf/tcc
Perfectly Secure Oblivious Parallel RAM.
T.-H. Hubert Chan
Kartik Nayak
Elaine Shi
2018
conf/tcc
Game Theoretic Notions of Fairness in Multi-party Coin Toss.
Kai-Min Chung
Yue Guo
Wei-Kai Lin
Rafael Pass
Elaine Shi
2017
conf/ccs
Solidus: Confidential Distributed Ledger Transactions via PVORM.
Ethan Cecchetti
Fan Zhang
Yan Ji
Ahmed E. Kosba
Ari Juels
Elaine Shi
2017
conf/eurosp
Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge.
Florian Tramèr
Fan Zhang
Huang Lin
Jean-Pierre Hubaux
Ari Juels
Elaine Shi
2017
conf/ndss
HOP: Hardware makes Obfuscation Practical.
Kartik Nayak
Christopher W. Fletcher
Ling Ren
Nishanth Chandran
Satya V. Lokam
Elaine Shi
Vipul Goyal
2017
conf/eurocrypt
Formal Abstractions for Attested Execution Secure Processors.
Rafael Pass
Elaine Shi
Florian Tramèr
2017
conf/asiacrypt
Oblivious Hashing Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM.
T.-H. Hubert Chan
Yue Guo
Wei-Kai Lin
Elaine Shi
2017
conf/asiacrypt
The Sleepy Model of Consensus.
Rafael Pass
Elaine Shi
2017
conf/asiacrypt
On the Depth of Oblivious Parallel RAM.
T.-H. Hubert Chan
Kai-Min Chung
Elaine Shi
2017
conf/tcc
Circuit OPRAM: Unifying Statistically and Computationally Secure ORAMs and OPRAMs.
T.-H. Hubert Chan
Elaine Shi
2016
conf/ccs
Town Crier: An Authenticated Data Feed for Smart Contracts.
Fan Zhang
Ethan Cecchetti
Kyle Croman
Ari Juels
Elaine Shi
2016
conf/ccs
The Ring of Gyges: Investigating the Future of Criminal Smart Contracts.
Ari Juels
Ahmed E. Kosba
Elaine Shi
2016
conf/ccs
The Honey Badger of BFT Protocols.
Andrew Miller
Yu Xia
Kyle Croman
Elaine Shi
Dawn Song
2016
conf/fc
On Scaling Decentralized Blockchains - (A Position Paper).
Kyle Croman
Christian Decker
Ittay Eyal
Adem Efe Gencer
Ari Juels
Ahmed E. Kosba
Andrew Miller
Prateek Saxena
Elaine Shi
Emin Gün Sirer
Dawn Song
Roger Wattenhofer
2016
conf/fc
Understanding Craigslist Rental Scams.
Youngsam Park
Damon McCoy
Elaine Shi
2016
conf/fc
Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab.
Kevin Delmolino
Mitchell Arnett
Ahmed E. Kosba
Andrew Miller
Elaine Shi
2016
conf/sp
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.
Ahmed E. Kosba
Andrew Miller
Elaine Shi
Zikai Wen
Charalampos Papamanthou
2016
conf/eurosp
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack.
Kartik Nayak
Srijan Kumar
Andrew Miller
Elaine Shi
2016
conf/tcc
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM.
Srinivas Devadas
Marten van Dijk
Christopher W. Fletcher
Ling Ren
Elaine Shi
Daniel Wichs
2015
conf/ccs
Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions.
Andrew Miller
Ahmed E. Kosba
Jonathan Katz
Elaine Shi
2015
conf/ccs
Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound.
Xiao Wang
T.-H. Hubert Chan
Elaine Shi
2015
conf/uss
Constants Count: Practical Improvements to Oblivious RAM.
Ling Ren
Christopher W. Fletcher
Albert Kwon
Emil Stefanov
Elaine Shi
Marten van Dijk
Srinivas Devadas
2015
conf/crypto
Constant-Round MPC with Fairness and Guarantee of Output Delivery.
S. Dov Gordon
Feng-Hao Liu
Elaine Shi
2015
conf/sp
GraphSC: Parallel Secure Computation Made Easy.
Kartik Nayak
Xiao Shaun Wang
Stratis Ioannidis
Udi Weinsberg
Nina Taft
Elaine Shi
2015
conf/sp
ObliVM: A Programming Framework for Secure Computation.
Chang Liu
Xiao Shaun Wang
Kartik Nayak
Yan Huang
Elaine Shi
2015
conf/asiacrypt
Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness.
Dana Dachman-Soled
Chang Liu
Charalampos Papamanthou
Elaine Shi
Uzi Vishkin
2015
conf/tcc
Multi-Client Verifiable Computation with Stronger Security Guarantees.
S. Dov Gordon
Jonathan Katz
Feng-Hao Liu
Elaine Shi
Hong-Sheng Zhou
2015
conf/tcc
Locally Decodable and Updatable Non-malleable Codes and Their Applications.
Dana Dachman-Soled
Feng-Hao Liu
Elaine Shi
Hong-Sheng Zhou
2014
conf/ccs
Emil Stefanov: Bridging the Theory and Practice of Cloud Computing Security.
Elaine Shi
2014
conf/ccs
SCORAM: Oblivious RAM for Secure Computation.
Xiao Shaun Wang
Yan Huang
T.-H. Hubert Chan
Abhi Shelat
Elaine Shi
2014
conf/ccs
Oblivious Data Structures.
Xiao Shaun Wang
Kartik Nayak
Chang Liu
T.-H. Hubert Chan
Elaine Shi
Emil Stefanov
Yan Huang
2014
conf/ccs
ShadowCrypt: Encrypted Web Applications for Everyone.
Warren He
Devdatta Akhawe
Sumeet Jain
Elaine Shi
Dawn Xiaodong Song
2014
conf/uss
SDDR: Light-Weight, Secure Mobile Encounters.
Matthew Lentz
Viktor Erdélyi
Paarijaat Aditya
Elaine Shi
Peter Druschel
Bobby Bhattacharjee
2014
conf/uss
TRUESET: Faster Verifiable Set Computations.
Ahmed E. Kosba
Dimitrios Papadopoulos
Charalampos Papamanthou
Mahmoud F. Sayed
Elaine Shi
Nikos Triandopoulos
2014
conf/uss
Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns.
Jonathan L. Dautrich Jr.
Emil Stefanov
Elaine Shi
2014
conf/sp
Automating Efficient RAM-Model Secure Computation.
Chang Liu
Yan Huang
Elaine Shi
Jonathan Katz
Michael W. Hicks
2014
conf/sp
Permacoin: Repurposing Bitcoin Work for Data Preservation.
Andrew Miller
Ari Juels
Elaine Shi
Bryan Parno
Jonathan Katz
2014
conf/ndss
Scambaiter: Understanding Targeted Nigerian Scams on Craigslist.
Youngsam Park
Jackie Jones
Damon McCoy
Elaine Shi
Markus Jakobsson
2014
conf/ndss
Practical Dynamic Searchable Encryption with Small Leakage.
Emil Stefanov
Charalampos Papamanthou
Elaine Shi
2014
conf/pkc
Verifiable Oblivious Storage.
Daniel Apon
Jonathan Katz
Elaine Shi
Aishwarya Thiruvengadam
2014
conf/eurocrypt
Multi-input Functional Encryption.
Shafi Goldwasser
S. Dov Gordon
Vipul Goyal
Abhishek Jain
Jonathan Katz
Feng-Hao Liu
Amit Sahai
Elaine Shi
Hong-Sheng Zhou
2013
conf/ccs
Path ORAM: an extremely simple oblivious RAM protocol.
Emil Stefanov
Marten van Dijk
Elaine Shi
Christopher W. Fletcher
Ling Ren
Xiangyao Yu
Srinivas Devadas
2013
conf/ccs
Multi-cloud oblivious storage.
Emil Stefanov
Elaine Shi
2013
conf/ccs
Practical dynamic proofs of retrievability.
Elaine Shi
Emil Stefanov
Charalampos Papamanthou
2013
conf/ccs
Summary/overview for artificial intelligence and security (AISec'13).
Blaine Nelson
Christos Dimitrakakis
Elaine Shi
2013
conf/ccs
PHANTOM: practical oblivious computation in a secure processor.
Martin Maas
Eric Love
Emil Stefanov
Mohit Tiwari
Elaine Shi
Krste Asanovic
John Kubiatowicz
Dawn Song
2013
conf/sp
ObliviStore: High Performance Oblivious Cloud Storage.
Emil Stefanov
Elaine Shi
2013
conf/ndss
ObliviStore: High Performance Oblivious Distributed Cloud Data Store.
Emil Stefanov
Elaine Shi
2013
conf/eurocrypt
Streaming Authenticated Data Structures.
Charalampos Papamanthou
Elaine Shi
Roberto Tamassia
Ke Yi
2013
conf/tcc
Signatures of Correct Computation.
Charalampos Papamanthou
Elaine Shi
Roberto Tamassia
2012
conf/uss
Context-centric Security.
Mohit Tiwari
Prashanth Mohan
Andrew Osheroff
Hilfi Alkaff
Elaine Shi
Eric Love
Dawn Song
Krste Asanovic
2012
conf/fc
Privacy-Preserving Stream Aggregation with Fault Tolerance.
T.-H. Hubert Chan
Elaine Shi
Dawn Song
2012
conf/fc
Bitter to Better - How to Make Bitcoin a Better Currency.
Simon Barber
Xavier Boyen
Elaine Shi
Ersin Uzun
2012
conf/ndss
Towards Practical Oblivious RAM.
Emil Stefanov
Elaine Shi
Dawn Xiaodong Song
2012
conf/pkc
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies.
Emil Stefanov
Elaine Shi
Dawn Song
2011
conf/ndss
Privacy-Preserving Aggregation of Time-Series Data.
Elaine Shi
T.-H. Hubert Chan
Eleanor Gilbert Rieffel
Richard Chow
Dawn Song
2011
conf/asiacrypt
Oblivious RAM with O((logN)3) Worst-Case Cost.
Elaine Shi
T.-H. Hubert Chan
Emil Stefanov
Mingfei Li
2011
conf/wisec
Efficient and secure threshold-based event validation for VANETs.
Hsu-Chun Hsiao
Ahren Studer
Rituik Dubey
Elaine Shi
Adrian Perrig
2010
conf/ccs
Authentication in the clouds: a framework and its application to mobile users.
Richard Chow
Markus Jakobsson
Ryusuke Masuoka
Jesus Molina
Yuan Niu
Elaine Shi
Zhexuan Song
2010
conf/fc
Signatures of Reputation.
John Bethencourt
Elaine Shi
Dawn Song
2009
conf/ccs
Controlling data in the cloud: outsourcing computation without outsourcing control.
Richard Chow
Philippe Golle
Markus Jakobsson
Elaine Shi
Jessica Staddon
Ryusuke Masuoka
Jesus Molina
2009
conf/tcc
Predicate Privacy in Encryption Systems.
Emily Shen
Elaine Shi
Brent Waters
2007
conf/sp
Multi-Dimensional Range Query over Encrypted Data.
Elaine Shi
John Bethencourt
T.-H. Hubert Chan
Dawn Xiaodong Song
Adrian Perrig
2005
conf/sp
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems.
Elaine Shi
Adrian Perrig
Leendert van Doorn
2005
conf/sp
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts.
Jonathan M. McCune
Elaine Shi
Adrian Perrig
Michael K. Reiter
Coauthors
Abhi Shelat
(1)
Abhishek Jain
(1)
Adem Efe Gencer
(1)
Adrian Perrig
(4)
Afonso Tinoco
(3)
Ahmed E. Kosba
(8)
Ahren Studer
(1)
Aishwarya Thiruvengadam
(1)
Albert Kwon
(1)
Amit Sahai
(1)
Andrew Miller
(7)
Andrew Morgan
(1)
Andrew Osheroff
(1)
Andrew Park
(2)
Antigoni Polychroniadou
(2)
Ari Juels
(6)
Aron Laszka
(1)
Ashrujit Ghoshal
(2)
Attila A. Yavuz
(1)
Balakrishnan Chandrasekaran
(1)
Benjamin Grégoire
(1)
Bin-Chou Kao
(1)
Bingnan Chen
(1)
Blaine Nelson
(1)
Bo Peng
(1)
Bobby Bhattacharjee
(1)
Brent Waters
(2)
Bruce M. Maggs
(1)
Bryan Parno
(1)
Chang Liu
(5)
Charalampos Papamanthou
(9)
Charlie Jacomme
(1)
Chenxin Dai
(1)
Chien-Ying Chen
(1)
Christian Decker
(1)
Christopher W. Fletcher
(4)
Christos Dimitrakakis
(1)
Damon McCoy
(2)
Dana Dachman-Soled
(4)
Daniel Apon
(1)
Daniel Wichs
(2)
David Byrd
(1)
Dawn Song
(8)
Dawn Xiaodong Song
(3)
Devdatta Akhawe
(1)
Dimitrios Papadopoulos
(1)
Elaine Shi
(118)
Eleanor Gilbert Rieffel
(1)
Emil Stefanov
(13)
Emily Shen
(1)
Emin Gün Sirer
(1)
Enoch Peserico
(1)
Eric Love
(2)
Ersin Uzun
(1)
Ethan Cecchetti
(2)
Fan Zhang
(3)
Feng-Hao Liu
(5)
Florian Tramèr
(2)
Fuhito Kojima
(1)
G. Edward Suh
(1)
Gilad Asharov
(6)
Gilles Barthe
(1)
Giulia Fanti
(3)
Go Yamamoto
(1)
Hanshen Xiao
(2)
Hao Chung
(1)
Hilfi Alkaff
(1)
Hong-Sheng Zhou
(4)
Hsu-Chun Hsiao
(1)
Huang Lin
(1)
Ilan Komargodski
(7)
Ittay Eyal
(1)
Jackie Jones
(1)
James R. Moyne
(1)
Jean-Pierre Hubaux
(1)
Jessica Staddon
(1)
Jesus Molina
(2)
Jiaheng Zhang
(1)
John Bethencourt
(2)
John Kubiatowicz
(1)
Jonathan Katz
(7)
Jonathan L. Dautrich Jr.
(1)
Jonathan M. McCune
(1)
Joshua Gancher
(1)
Jun Wan
(2)
Kai-Min Chung
(3)
Kartik Nayak
(10)
Ke Wu
(4)
Ke Yi
(3)
Kevin Delmolino
(1)
Kira Barton
(1)
Krste Asanovic
(2)
Kyle Croman
(3)
Leendert van Doorn
(1)
Ling Ren
(6)
Mahmoud F. Sayed
(1)
Markus Jakobsson
(3)
Marten van Dijk
(3)
Martin Maas
(1)
Matthew Lentz
(1)
Michael K. Reiter
(1)
Michael W. Hicks
(1)
Mingfei Li
(1)
Mingxun Zhou
(7)
Mitchell Arnett
(1)
Mohit Tiwari
(2)
Mu Zhang
(1)
Nikhil Vanjani
(2)
Nikos Triandopoulos
(1)
Nina Taft
(1)
Nishanth Chandran
(1)
Paarijaat Aditya
(1)
Pengzhi Huang
(2)
Peter Druschel
(1)
Phil Daian
(1)
Philippe Golle
(1)
Prabhanjan Ananth
(1)
Prashanth Mohan
(1)
Prateek Saxena
(1)
Pratik Soni
(2)
Qiyao Luo
(1)
Rafael Pass
(11)
Rex Fernando
(4)
Richard Chow
(3)
Rituik Dubey
(1)
Roberto Tamassia
(2)
Roger Wattenhofer
(1)
Ryusuke Masuoka
(2)
S. Dov Gordon
(3)
Satya V. Lokam
(1)
Shafi Goldwasser
(1)
Shin'ichiro Matsuo
(2)
Shir Maimon
(1)
Sibin Mohan
(1)
Simon Barber
(1)
Sixiang Gao
(1)
Sourav Das
(1)
Sri Harish G. Rajan
(1)
Srijan Kumar
(1)
Srinivas Devadas
(5)
Stratis Ioannidis
(1)
Sumeet Jain
(1)
T.-H. Hubert Chan
(19)
Thang Hoang
(3)
Tiancheng Xie
(1)
Tianhao Wang
(1)
Tianyao Gu
(2)
Ting Wen
(1)
Tucker Balch
(1)
Tung Le
(1)
Udi Weinsberg
(1)
Uzi Vishkin
(2)
Viktor Erdélyi
(1)
Vipul Goyal
(2)
Waqar Aqeel
(1)
Warren He
(1)
Wei Dong
(1)
Wei-Kai Lin
(7)
Wenting Zheng
(1)
Xavier Boyen
(1)
Xiangyao Yu
(1)
Xiao Shaun Wang
(4)
Xiao Wang
(1)
Xiong Fan
(2)
Yan Huang
(4)
Yan Ji
(1)
Yanyi Liu
(1)
Yaohua Ma
(1)
Yassine Qamsane
(1)
Yiannis Tselekounis
(1)
Yikai Lin
(1)
Yilei Wang
(1)
Yoko Shibuya
(1)
Youngsam Park
(2)
Yu Xia
(1)
Yuan Niu
(1)
Yue Guo
(4)
Yueying Li
(1)
Yupeng Zhang
(1)
Yuru Shao
(1)
Yuval Gelles
(1)
Yuval Ishai
(1)
Z. Morley Mao
(1)
Zhexuan Song
(1)
Zikai Wen
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to