What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Adam D. Smith
Google Scholar
34
publications in security and cryptology related venues
Year
Venue
Title
2023
conf/ccs
Control, Confidentiality, and the Right to be Forgotten.
Aloni Cohen
Adam D. Smith
Marika Swanberg
Prashant Nalini Vasudevan
2022
journals/popets
Differentially Private Simple Linear Regression.
Daniel Alabi
Audra McMillan
Jayshree Sarathy
Adam D. Smith
Salil P. Vadhan
2021
journals/joc
Reusable Fuzzy Extractors for Low-Entropy Distributions.
Ran Canetti
Benjamin Fuller
Omer Paneth
Leonid Reyzin
Adam D. Smith
2021
conf/sp
Manipulation Attacks in Local Differential Privacy.
Albert Cheu
Adam D. Smith
Jonathan R. Ullman
2019
conf/eurocrypt
Distributed Differential Privacy via Shuffling.
Albert Cheu
Adam D. Smith
Jonathan R. Ullman
David Zeber
Maxim Zhilyaev
2017
journals/joc
Instantiability of RSA-OAEP Under Chosen-Plaintext Attack.
Eike Kiltz
Adam O'Neill
Adam D. Smith
2017
conf/sp
Is Interaction Necessary for Distributed Private Learning?
Adam D. Smith
Abhradeep Thakurta
Jalaj Upadhyay
2016
conf/eurocrypt
Reusable Fuzzy Extractors for Low-Entropy Distributions.
Ran Canetti
Benjamin Fuller
Omer Paneth
Leonid Reyzin
Adam D. Smith
2016
conf/asiacrypt
When Are Fuzzy Extractors Possible?
Benjamin Fuller
Leonid Reyzin
Adam D. Smith
2015
journals/joc
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs.
Craig Gentry
Jens Groth
Yuval Ishai
Chris Peikert
Amit Sahai
Adam D. Smith
2015
conf/tcc
On the Regularity of Lossy RSA - Improved Bounds and Applications to Padding-Based Encryption.
Adam D. Smith
Ye Zhang
2013
conf/eurocrypt
Regularity of Lossy RSA on Subdomains and Its Applications.
Mark Lewko
Adam O'Neill
Adam D. Smith
2013
conf/tcc
Analyzing Graphs with Node Differential Privacy.
Shiva Prasad Kasiviswanathan
Kobbi Nissim
Sofya Raskhodnikova
Adam D. Smith
2011
conf/crypto
Classical Cryptographic Protocols in a Quantum World.
Sean Hallgren
Adam D. Smith
Fang Song
2010
journals/joc
Parallel and Concurrent Security of the HB and HB<sup>+</sup> Protocols.
Jonathan Katz
Ji Sun Shin
Adam D. Smith
2010
conf/crypto
Instantiability of RSA-OAEP under Chosen-Plaintext Attack.
Eike Kiltz
Adam O'Neill
Adam D. Smith
2009
conf/tcc
Composability and On-Line Deniability of Authentication.
Yevgeniy Dodis
Jonathan Katz
Adam D. Smith
Shabsi Walfish
2009
conf/cans
Asymptotically Optimal and Private Statistical Estimation.
Adam D. Smith
2008
conf/crypto
Scalable Multiparty Computation with Nearly Optimal Work and Resilience.
Ivan Damgård
Yuval Ishai
Mikkel Krøigaard
Jesper Buus Nielsen
Adam D. Smith
2008
conf/eurocrypt
Efficient Two Party and Multi Party Computation Against Covert Adversaries.
Vipul Goyal
Payman Mohassel
Adam D. Smith
2008
conf/acsac
Defending Against Attacks on Main Memory Persistence.
William Enck
Kevin R. B. Butler
Thomas Richardson
Patrick D. McDaniel
Adam D. Smith
2006
conf/crypto
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets.
Yevgeniy Dodis
Jonathan Katz
Leonid Reyzin
Adam D. Smith
2006
conf/crypto
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models.
Moni Naor
Gil Segev
Adam D. Smith
2006
conf/tcc
Calibrating Noise to Sensitivity in Private Data Analysis.
Cynthia Dwork
Frank McSherry
Kobbi Nissim
Adam D. Smith
2005
conf/eurocrypt
Secure Remote Authentication Using Biometric Data.
Xavier Boyen
Yevgeniy Dodis
Jonathan Katz
Rafail Ostrovsky
Adam D. Smith
2005
conf/eurocrypt
Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes.
Claude Crépeau
Daniel Gottesman
Adam D. Smith
2005
conf/tcc
Toward Privacy in Public Databases.
Shuchi Chawla
Cynthia Dwork
Frank McSherry
Adam D. Smith
Hoeteck Wee
2005
conf/tcc
Entropic Security and the Encryption of High Entropy Messages.
Yevgeniy Dodis
Adam D. Smith
2004
conf/eurocrypt
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data.
Yevgeniy Dodis
Leonid Reyzin
Adam D. Smith
2004
conf/tcc
List-Decoding of Linear Functions and Analysis of a Two-Round Zero-Knowledge Argument.
Cynthia Dwork
Ronen Shaltiel
Adam D. Smith
Luca Trevisan
2003
conf/eurocrypt
Round Efficiency of Multi-party Computation with a Dishonest Majority.
Jonathan Katz
Rafail Ostrovsky
Adam D. Smith
2001
conf/eurocrypt
Efficient and Non-interactive Non-malleable Commitment.
Giovanni Di Crescenzo
Jonathan Katz
Rafail Ostrovsky
Adam D. Smith
2001
conf/eurocrypt
On Perfect and Adaptive Security in Exposure-Resilient Cryptography.
Yevgeniy Dodis
Amit Sahai
Adam D. Smith
2001
conf/asiacrypt
Mutually Independent Commitments.
Moses D. Liskov
Anna Lysyanskaya
Silvio Micali
Leonid Reyzin
Adam D. Smith
Coauthors
Abhradeep Thakurta
(1)
Adam D. Smith
(34)
Adam O'Neill
(3)
Albert Cheu
(2)
Aloni Cohen
(1)
Amit Sahai
(2)
Anna Lysyanskaya
(1)
Audra McMillan
(1)
Benjamin Fuller
(3)
Chris Peikert
(1)
Claude Crépeau
(1)
Craig Gentry
(1)
Cynthia Dwork
(3)
Daniel Alabi
(1)
Daniel Gottesman
(1)
David Zeber
(1)
Eike Kiltz
(2)
Fang Song
(1)
Frank McSherry
(2)
Gil Segev
(1)
Giovanni Di Crescenzo
(1)
Hoeteck Wee
(1)
Ivan Damgård
(1)
Jalaj Upadhyay
(1)
Jayshree Sarathy
(1)
Jens Groth
(1)
Jesper Buus Nielsen
(1)
Ji Sun Shin
(1)
Jonathan Katz
(6)
Jonathan R. Ullman
(2)
Kevin R. B. Butler
(1)
Kobbi Nissim
(2)
Leonid Reyzin
(6)
Luca Trevisan
(1)
Marika Swanberg
(1)
Mark Lewko
(1)
Maxim Zhilyaev
(1)
Mikkel Krøigaard
(1)
Moni Naor
(1)
Moses D. Liskov
(1)
Omer Paneth
(2)
Patrick D. McDaniel
(1)
Payman Mohassel
(1)
Prashant Nalini Vasudevan
(1)
Rafail Ostrovsky
(3)
Ran Canetti
(2)
Ronen Shaltiel
(1)
Salil P. Vadhan
(1)
Sean Hallgren
(1)
Shabsi Walfish
(1)
Shiva Prasad Kasiviswanathan
(1)
Shuchi Chawla
(1)
Silvio Micali
(1)
Sofya Raskhodnikova
(1)
Thomas Richardson
(1)
Vipul Goyal
(1)
William Enck
(1)
Xavier Boyen
(1)
Ye Zhang
(1)
Yevgeniy Dodis
(6)
Yuval Ishai
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to