What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Amit Sahai
Google Scholar
145
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurocrypt
Post-quantum PKE from Unstructured Noisy Linear Algebraic Assumptions: Beyond LWE and Alekhnovich's LPN.
Riddhi Ghosal
Aayush Jain
Paul Lou
Amit Sahai
Neekon Vafa
2025
conf/crypto
Dynamic Bounded-Collusion Streaming Functional Encryption from Minimal Assumptions.
Kaartik Bhushan
Alexis Korb
Amit Sahai
2025
conf/crypto
Incrementally Verifiable Computation for NP from Standard Assumptions.
Pratish Datta
Abhishek Jain
Zhengzhong Jin
Alexis Korb
Surya Mathialagan
Amit Sahai
2024
journals/joc
Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation.
Yuval Ishai
Alexis Korb
Paul Lou
Amit Sahai
2024
conf/eurocrypt
Witness Semantic Security.
Paul Lou
Nathan Manohar
Amit Sahai
2023
conf/crypto
Computational Wiretap Coding from Indistinguishability Obfuscation.
Yuval Ishai
Aayush Jain
Paul Lou
Amit Sahai
Mark Zhandry
2023
conf/crypto
Streaming Functional Encryption.
Jiaxin Guan
Alexis Korb
Amit Sahai
2023
conf/crypto
Round-Optimal Black-Box MPC in the Plain Model.
Yuval Ishai
Dakshita Khurana
Amit Sahai
Akshayaram Srinivasan
2023
conf/pkc
Non-Interactive Publicly-Verifiable Delegation of Committed Programs.
Riddhi Ghosal
Amit Sahai
Brent Waters
2023
conf/eurocrypt
Black-Box Reusable NISC with Random Oracles.
Yuval Ishai
Dakshita Khurana
Amit Sahai
Akshayaram Srinivasan
2023
conf/eurocrypt
Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-quantum i풪.
Aayush Jain
Huijia Lin
Paul Lou
Amit Sahai
2023
conf/asiacrypt
Two-Round Concurrent 2PC from Sub-exponential LWE.
Behzad Abdolmaleki
Saikrishna Badrinarayanan
Rex Fernando
Giulio Malavolta
Ahmadreza Rahimi
Amit Sahai
2022
conf/crypto
Beyond the Csiszár-Korner Bound: Best-Possible Wiretap Coding via Obfuscation.
Yuval Ishai
Alexis Korb
Paul Lou
Amit Sahai
2022
conf/eurocrypt
Indistinguishability Obfuscation from LPN over $\mathbb {F}_p$, DLIN, and PRGs in NC<sup>0</sup>.
Aayush Jain
Huijia Lin
Amit Sahai
2022
conf/eurocrypt
Round-Optimal Black-Box Protocol Compilers.
Yuval Ishai
Dakshita Khurana
Amit Sahai
Akshayaram Srinivasan
2022
conf/asiacrypt
Efficient NIZKs from LWE via Polynomial Reconstruction and "MPC in the Head".
Riddhi Ghosal
Paul Lou
Amit Sahai
2022
conf/tcc
Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT.
Yuval Ishai
Dakshita Khurana
Amit Sahai
Akshayaram Srinivasan
2021
conf/crypto
On the Round Complexity of Black-Box Secure MPC.
Yuval Ishai
Dakshita Khurana
Amit Sahai
Akshayaram Srinivasan
2021
conf/eurocrypt
Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification.
Romain Gay
Aayush Jain
Huijia Lin
Amit Sahai
2020
journals/popets
Self-Processing Private Sensor Data via Garbled Encryption.
Nathan Manohar
Abhishek Jain
Amit Sahai
2020
conf/crypto
Amplifying the Security of Functional Encryption, Unconditionally.
Aayush Jain
Alexis Korb
Nathan Manohar
Amit Sahai
2020
conf/eurocrypt
Statistical ZAP Arguments.
Saikrishna Badrinarayanan
Rex Fernando
Aayush Jain
Dakshita Khurana
Amit Sahai
2020
conf/eurocrypt
Combiners for Functional Encryption, Unconditionally.
Aayush Jain
Nathan Manohar
Amit Sahai
2020
conf/asiacrypt
Secure MPC: Laziness Leads to GOD.
Saikrishna Badrinarayanan
Aayush Jain
Nathan Manohar
Amit Sahai
2020
conf/tcc
On Pseudorandom Encodings.
Thomas Agrikola
Geoffroy Couteau
Yuval Ishai
Stanislaw Jarecki
Amit Sahai
2019
conf/crypto
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification.
Prabhanjan Ananth
Aayush Jain
Huijia Lin
Christian Matt
Amit Sahai
2019
conf/crypto
Simultaneous Amplification: The Case of Non-interactive Zero-Knowledge.
Vipul Goyal
Aayush Jain
Amit Sahai
2019
conf/crypto
Cryptographic Sensing.
Yuval Ishai
Eyal Kushilevitz
Rafail Ostrovsky
Amit Sahai
2019
conf/eurocrypt
Sum-of-Squares Meets Program Obfuscation, Revisited.
Boaz Barak
Samuel B. Hopkins
Aayush Jain
Pravesh Kothari
Amit Sahai
2019
conf/eurocrypt
How to Leverage Hardness of Constant-Degree Expanding Polynomials over \mathbb R R to build i풪 i O.
Aayush Jain
Huijia Lin
Christian Matt
Amit Sahai
2019
conf/asiacrypt
Output Compression, MPC, and iO for Turing Machines.
Saikrishna Badrinarayanan
Rex Fernando
Venkata Koppula
Amit Sahai
Brent Waters
2019
conf/tcc
From FE Combiners to Secure MPC and Back.
Prabhanjan Ananth
Saikrishna Badrinarayanan
Aayush Jain
Nathan Manohar
Amit Sahai
2018
conf/crypto
Threshold Cryptosystems from Threshold Fully Homomorphic Encryption.
Dan Boneh
Rosario Gennaro
Steven Goldfeder
Aayush Jain
Sam Kim
Peter M. R. Rasmussen
Amit Sahai
2018
conf/crypto
Promise Zero Knowledge and Its Applications to Round Optimal MPC.
Saikrishna Badrinarayanan
Vipul Goyal
Abhishek Jain
Yael Tauman Kalai
Dakshita Khurana
Amit Sahai
2018
conf/crypto
Private Circuits: A Modular Approach.
Prabhanjan Ananth
Yuval Ishai
Amit Sahai
2018
conf/eurocrypt
Statistical Witness Indistinguishability (and more) in Two Messages.
Yael Tauman Kalai
Dakshita Khurana
Amit Sahai
2018
conf/eurocrypt
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs.
Dan Boneh
Yuval Ishai
Amit Sahai
David J. Wu
2018
conf/tcc
Exploring Crypto Dark Matter: - New Simple PRF Candidates and Their Applications.
Dan Boneh
Yuval Ishai
Alain Passelègue
Amit Sahai
David J. Wu
2018
conf/tcc
Upgrading to Functional Encryption.
Saikrishna Badrinarayanan
Dakshita Khurana
Amit Sahai
Brent Waters
2017
conf/crypto
Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization.
Prabhanjan Ananth
Abhishek Jain
Amit Sahai
2017
conf/eurocrypt
for Evolving Software.
Prabhanjan Ananth
Abhishek Jain
Amit Sahai
2017
conf/eurocrypt
Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption.
Prabhanjan Ananth
Aayush Jain
Amit Sahai
2017
conf/eurocrypt
Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps.
Prabhanjan Ananth
Amit Sahai
2017
conf/eurocrypt
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation.
Dan Boneh
Yuval Ishai
Amit Sahai
David J. Wu
2017
conf/asiacrypt
Preventing CLT Attacks on Obfuscation with Linear Overhead.
Rex Fernando
Peter M. R. Rasmussen
Amit Sahai
2017
conf/asiacrypt
Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions.
Saikrishna Badrinarayanan
Sanjam Garg
Yuval Ishai
Amit Sahai
Akshay Wadia
2017
conf/asiacrypt
Non-Interactive Multiparty Computation Without Correlated Randomness.
Shai Halevi
Yuval Ishai
Abhishek Jain
Ilan Komargodski
Amit Sahai
Eylon Yogev
2017
conf/tcc
Round Optimal Concurrent MPC via Strong Simulation.
Saikrishna Badrinarayanan
Vipul Goyal
Abhishek Jain
Dakshita Khurana
Amit Sahai
2016
conf/crypto
Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption.
Prabhanjan Ananth
Aayush Jain
Moni Naor
Amit Sahai
Eylon Yogev
2016
conf/crypto
Secure Protocol Transformations.
Yuval Ishai
Eyal Kushilevitz
Manoj Prabhakaran
Amit Sahai
Ching-Hua Yu
2016
conf/crypto
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13.
Eric Miles
Amit Sahai
Mark Zhandry
2016
conf/eurocrypt
All Complete Functionalities are Reversible.
Dakshita Khurana
Daniel Kraschewski
Hemanta K. Maji
Manoj Prabhakaran
Amit Sahai
2016
conf/eurocrypt
Secure Computation from Elastic Noisy Channels.
Dakshita Khurana
Hemanta K. Maji
Amit Sahai
2016
conf/eurocrypt
Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits.
Saikrishna Badrinarayanan
Eric Miles
Amit Sahai
Mark Zhandry
2016
conf/asiacrypt
How to Generate and Use Universal Samplers.
Dennis Hofheinz
Tibor Jager
Dakshita Khurana
Amit Sahai
Brent Waters
Mark Zhandry
2016
conf/asiacrypt
Verifiable Functional Encryption.
Saikrishna Badrinarayanan
Vipul Goyal
Aayush Jain
Amit Sahai
2016
conf/tcc
Functional Encryption for Turing Machines.
Prabhanjan Vijendra Ananth
Amit Sahai
2016
conf/tcc
Secure Obfuscation in a Weak Multilinear Map Model.
Sanjam Garg
Eric Miles
Pratyay Mukherjee
Amit Sahai
Akshayaram Srinivasan
Mark Zhandry
2015
journals/joc
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs.
Craig Gentry
Jens Groth
Yuval Ishai
Chris Peikert
Amit Sahai
Adam D. Smith
2015
conf/crypto
Secure Computation from Leaky Correlated Randomness.
Divya Gupta
Yuval Ishai
Hemanta K. Maji
Amit Sahai
2015
conf/crypto
Concurrent Secure Computation via Non-Black Box Simulation.
Vipul Goyal
Divya Gupta
Amit Sahai
2015
conf/crypto
Cryptography with One-Way Communication.
Sanjam Garg
Yuval Ishai
Eyal Kushilevitz
Rafail Ostrovsky
Amit Sahai
2015
conf/crypto
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations.
Jean-Sébastien Coron
Craig Gentry
Shai Halevi
Tancrède Lepoint
Hemanta K. Maji
Eric Miles
Mariana Raykova
Amit Sahai
Mehdi Tibouchi
2015
conf/pkc
On the Practical Security of Inner Product Functional Encryption.
Shashank Agrawal
Shweta Agrawal
Saikrishna Badrinarayanan
Abishek Kumarasubramanian
Manoj Prabhakaran
Amit Sahai
2015
conf/eurocrypt
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation.
Dan Boneh
Kevin Lewi
Mariana Raykova
Amit Sahai
Mark Zhandry
Joe Zimmerman
2015
conf/eurocrypt
Hosting Services on an Untrusted Cloud.
Dan Boneh
Divya Gupta
Ilya Mironov
Amit Sahai
2015
conf/asiacrypt
Multi-input Functional Encryption for Unbounded Arity Functions.
Saikrishna Badrinarayanan
Divya Gupta
Abhishek Jain
Amit Sahai
2015
conf/asiacrypt
Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation.
Dakshita Khurana
Vanishree Rao
Amit Sahai
2015
conf/tcc
Obfuscation-Based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP.
Omkant Pandey
Manoj Prabhakaran
Amit Sahai
2015
conf/tcc
Functional Encryption for Randomized Functionalities.
Vipul Goyal
Abhishek Jain
Venkata Koppula
Amit Sahai
2015
conf/tcc
Public-Coin Differing-Inputs Obfuscation and Its Applications.
Yuval Ishai
Omkant Pandey
Amit Sahai
2015
conf/tcc
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma.
Vipul Goyal
Huijia Lin
Omkant Pandey
Rafael Pass
Amit Sahai
2014
conf/ccs
Optimizing Obfuscation: Avoiding Barrington's Theorem.
Prabhanjan Vijendra Ananth
Divya Gupta
Yuval Ishai
Amit Sahai
2014
conf/eurocrypt
Multi-input Functional Encryption.
Shafi Goldwasser
S. Dov Gordon
Vipul Goyal
Abhishek Jain
Jonathan Katz
Feng-Hao Liu
Amit Sahai
Elaine Shi
Hong-Sheng Zhou
2014
conf/eurocrypt
Protecting Obfuscation against Algebraic Attacks.
Boaz Barak
Sanjam Garg
Yael Tauman Kalai
Omer Paneth
Amit Sahai
2014
conf/eurocrypt
A Full Characterization of Completeness for Two-Party Randomized Function Evaluation.
Daniel Kraschewski
Hemanta K. Maji
Manoj Prabhakaran
Amit Sahai
2014
conf/eurocrypt
Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation.
Susan Hohenberger
Amit Sahai
Brent Waters
2014
conf/asiacrypt
Black-Box Separations for Differentially Private Protocols.
Dakshita Khurana
Hemanta K. Maji
Amit Sahai
2014
conf/tcc
Statistical Concurrent Non-malleable Zero Knowledge.
Claudio Orlandi
Rafail Ostrovsky
Vanishree Rao
Amit Sahai
Ivan Visconti
2014
conf/tcc
Obfuscation for Evasive Functions.
Boaz Barak
Nir Bitansky
Ran Canetti
Yael Tauman Kalai
Omer Paneth
Amit Sahai
2013
journals/joc
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products.
Jonathan Katz
Amit Sahai
Brent Waters
2013
journals/joc
Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles.
Steve Lu
Rafail Ostrovsky
Amit Sahai
Hovav Shacham
Brent Waters
2013
conf/crypto
Attribute-Based Encryption for Circuits from Multilinear Maps.
Sanjam Garg
Craig Gentry
Shai Halevi
Amit Sahai
Brent Waters
2013
conf/crypto
Secure Computation against Adaptive Auxiliary Information.
Elette Boyle
Sanjam Garg
Abhishek Jain
Yael Tauman Kalai
Amit Sahai
2013
conf/crypto
Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols.
Vipul Goyal
Ilya Mironov
Omkant Pandey
Amit Sahai
2013
conf/crypto
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures.
Susan Hohenberger
Amit Sahai
Brent Waters
2013
conf/crypto
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based.
Craig Gentry
Amit Sahai
Brent Waters
2013
conf/asiacrypt
Discrete Gaussian Leftover Hash Lemma over Infinite Domains.
Shweta Agrawal
Craig Gentry
Shai Halevi
Amit Sahai
2012
conf/crypto
Adaptively Secure Multi-Party Computation with Dishonest Majority.
Sanjam Garg
Amit Sahai
2012
conf/crypto
Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption.
Amit Sahai
Hakan Seyalioglu
Brent Waters
2012
conf/crypto
New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation.
Shweta Agrawal
Vipul Goyal
Abhishek Jain
Manoj Prabhakaran
Amit Sahai
2012
conf/eurocrypt
Concurrently Secure Computation in Constant Rounds.
Sanjam Garg
Vipul Goyal
Abhishek Jain
Amit Sahai
2012
conf/tcc
On Efficient Zero-Knowledge PCPs.
Yuval Ishai
Mohammad Mahmoody
Amit Sahai
2011
conf/crypto
Round Optimal Blind Signatures.
Sanjam Garg
Vanishree Rao
Amit Sahai
Dominique Schröder
Dominique Unruh
2011
conf/crypto
Constant-Rate Oblivious Transfer from Noisy Channels.
Yuval Ishai
Eyal Kushilevitz
Rafail Ostrovsky
Manoj Prabhakaran
Amit Sahai
Jürg Wullschleger
2011
conf/crypto
Cryptography with Tamperable and Leaky Memory.
Yael Tauman Kalai
Bhavana Kanukurthi
Amit Sahai
2011
conf/crypto
Leakage-Resilient Zero Knowledge.
Sanjam Garg
Abhishek Jain
Amit Sahai
2011
conf/pkc
Fully Secure Accountable-Authority Identity-Based Encryption.
Amit Sahai
Hakan Seyalioglu
2011
conf/eurocrypt
Efficient Non-interactive Secure Computation.
Yuval Ishai
Eyal Kushilevitz
Rafail Ostrovsky
Manoj Prabhakaran
Amit Sahai
2011
conf/asiacrypt
Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge.
Yi Deng
Dengguo Feng
Vipul Goyal
Dongdai Lin
Amit Sahai
Moti Yung
2011
conf/tcc
Functional Encryption: Definitions and Challenges.
Dan Boneh
Amit Sahai
Brent Waters
2011
conf/tcc
Bringing People of Different Beliefs Together to Do UC.
Sanjam Garg
Vipul Goyal
Abhishek Jain
Amit Sahai
2010
conf/ccs
Worry-free encryption: functional encryption with public keys.
Amit Sahai
Hakan Seyalioglu
2010
conf/ccs
Building efficient fully collusion-resilient traitor tracing and revocation schemes.
Sanjam Garg
Abishek Kumarasubramanian
Amit Sahai
Brent Waters
2010
conf/crypto
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography.
Vipul Goyal
Yuval Ishai
Mohammad Mahmoody
Amit Sahai
2010
conf/sp
Revocation Systems with Very Small Private Keys.
Allison B. Lewko
Amit Sahai
Brent Waters
2010
conf/eurocrypt
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
Allison B. Lewko
Tatsuaki Okamoto
Amit Sahai
Katsuyuki Takashima
Brent Waters
2010
conf/asiacrypt
On Invertible Sampling and Adaptive Security.
Yuval Ishai
Abishek Kumarasubramanian
Claudio Orlandi
Amit Sahai
2010
conf/tcc
On Complete Primitives for Fairness.
S. Dov Gordon
Yuval Ishai
Tal Moran
Rafail Ostrovsky
Amit Sahai
2010
conf/tcc
Founding Cryptography on Tamper-Proof Hardware Tokens.
Vipul Goyal
Yuval Ishai
Amit Sahai
Ramarathnam Venkatesan
Akshay Wadia
2009
conf/crypto
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems.
Benny Applebaum
David Cash
Chris Peikert
Amit Sahai
2009
conf/eurocrypt
Resettably Secure Computation.
Vipul Goyal
Amit Sahai
2009
conf/tcc
Secure Arithmetic Computation with No Honest Majority.
Yuval Ishai
Manoj Prabhakaran
Amit Sahai
2008
conf/ccs
Black-box accountable authority identity-based encryption.
Vipul Goyal
Steve Lu
Amit Sahai
Brent Waters
2008
conf/crypto
Founding Cryptography on Oblivious Transfer - Efficiently.
Yuval Ishai
Manoj Prabhakaran
Amit Sahai
2008
conf/iciss
Computing on Encrypted Data.
Amit Sahai
2008
conf/eurocrypt
New Constructions for UC Secure Computation Using Tamper-Proof Hardware.
Nishanth Chandran
Vipul Goyal
Amit Sahai
2008
conf/eurocrypt
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products.
Jonathan Katz
Amit Sahai
Brent Waters
2008
conf/eurocrypt
Efficient Non-interactive Proof Systems for Bilinear Groups.
Jens Groth
Amit Sahai
2008
conf/eurocrypt
Precise Concurrent Zero Knowledge.
Omkant Pandey
Rafael Pass
Amit Sahai
Wei-Lung Dustin Tseng
Muthuramakrishnan Venkitasubramaniam
2007
conf/ccs
Attribute-based encryption with non-monotonic access structures.
Rafail Ostrovsky
Amit Sahai
Brent Waters
2007
conf/sp
Ciphertext-Policy Attribute-Based Encryption.
John Bethencourt
Amit Sahai
Brent Waters
2007
conf/asiacrypt
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions.
Vipul Goyal
Ryan Moriarty
Rafail Ostrovsky
Amit Sahai
2006
conf/ccs
Attribute-based encryption for fine-grained access control of encrypted data.
Vipul Goyal
Omkant Pandey
Amit Sahai
Brent Waters
2006
conf/crypto
Non-interactive Zaps and New Techniques for NIZK.
Jens Groth
Rafail Ostrovsky
Amit Sahai
2006
conf/eurocrypt
Perfect Non-interactive Zero Knowledge for NP.
Jens Groth
Rafail Ostrovsky
Amit Sahai
2006
conf/eurocrypt
Private Circuits II: Keeping Secrets in Tamperable Circuits.
Yuval Ishai
Manoj Prabhakaran
Amit Sahai
David A. Wagner
2006
conf/eurocrypt
Sequential Aggregate Signatures and Multisignatures Without Random Oracles.
Steve Lu
Rafail Ostrovsky
Amit Sahai
Hovav Shacham
Brent Waters
2006
conf/eurocrypt
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys.
Dan Boneh
Amit Sahai
Brent Waters
2006
conf/tcc
Concurrent Zero Knowledge Without Complexity Assumptions.
Daniele Micciancio
Shien Jin Ong
Amit Sahai
Salil P. Vadhan
2005
conf/eurocrypt
Fuzzy Identity-Based Encryption.
Amit Sahai
Brent Waters
2005
conf/tcc
Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation.
Manoj Prabhakaran
Amit Sahai
2004
conf/eurocrypt
Positive Results and Techniques for Obfuscation.
Ben Lynn
Manoj Prabhakaran
Amit Sahai
2003
conf/ccs
Receiver anonymity via incomparable public keys.
Brent R. Waters
Edward W. Felten
Amit Sahai
2003
conf/crypto
Private Circuits: Securing Hardware against Probing Attacks.
Yuval Ishai
Amit Sahai
David A. Wagner
2001
conf/crypto
On the (Im)possibility of Obfuscating Programs.
Boaz Barak
Oded Goldreich
Russell Impagliazzo
Steven Rudich
Amit Sahai
Salil P. Vadhan
Ke Yang
2001
conf/crypto
Robust Non-interactive Zero Knowledge.
Alfredo De Santis
Giovanni Di Crescenzo
Rafail Ostrovsky
Giuseppe Persiano
Amit Sahai
2001
conf/eurocrypt
On Perfect and Adaptive Security in Exposure-Resilient Cryptography.
Yevgeniy Dodis
Amit Sahai
Adam D. Smith
2000
conf/eurocrypt
Exposure-Resilient Functions and All-or-Nothing Transforms.
Ran Canetti
Yevgeniy Dodis
Shai Halevi
Eyal Kushilevitz
Amit Sahai
1999
conf/crypto
Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZK.
Oded Goldreich
Amit Sahai
Salil P. Vadhan
1999
conf/crypto
Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization.
Mihir Bellare
Amit Sahai
1999
conf/crypto
Coding Constructions for Blacklisting Problems without Computational Assumptions.
Ravi Kumar
Sridhar Rajagopalan
Amit Sahai
1999
conf/sacrypt
Pseudonym Systems.
Anna Lysyanskaya
Ronald L. Rivest
Amit Sahai
Stefan Wolf
1998
conf/crypto
Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems.
Mihir Bellare
Shai Halevi
Amit Sahai
Salil P. Vadhan
1998
conf/crypto
Concurrent Zero-Knowledge: Reducing the Need for Timing Constraints.
Cynthia Dwork
Amit Sahai
Coauthors
Aayush Jain
(18)
Abhishek Jain
(15)
Abishek Kumarasubramanian
(3)
Adam D. Smith
(2)
Ahmadreza Rahimi
(1)
Akshay Wadia
(2)
Akshayaram Srinivasan
(6)
Alain Passelègue
(1)
Alexis Korb
(6)
Alfredo De Santis
(1)
Allison B. Lewko
(2)
Amit Sahai
(145)
Anna Lysyanskaya
(1)
Behzad Abdolmaleki
(1)
Ben Lynn
(1)
Benny Applebaum
(1)
Bhavana Kanukurthi
(1)
Boaz Barak
(4)
Brent R. Waters
(1)
Brent Waters
(23)
Ching-Hua Yu
(1)
Chris Peikert
(2)
Christian Matt
(2)
Claudio Orlandi
(2)
Craig Gentry
(5)
Cynthia Dwork
(1)
Dakshita Khurana
(15)
Dan Boneh
(8)
Daniel Kraschewski
(2)
Daniele Micciancio
(1)
David A. Wagner
(2)
David Cash
(1)
David J. Wu
(3)
Dengguo Feng
(1)
Dennis Hofheinz
(1)
Divya Gupta
(5)
Dominique Schröder
(1)
Dominique Unruh
(1)
Dongdai Lin
(1)
Edward W. Felten
(1)
Elaine Shi
(1)
Elette Boyle
(1)
Eric Miles
(4)
Eyal Kushilevitz
(6)
Eylon Yogev
(2)
Feng-Hao Liu
(1)
Geoffroy Couteau
(1)
Giovanni Di Crescenzo
(1)
Giulio Malavolta
(1)
Giuseppe Persiano
(1)
Hakan Seyalioglu
(3)
Hemanta K. Maji
(6)
Hong-Sheng Zhou
(1)
Hovav Shacham
(2)
Huijia Lin
(6)
Ilan Komargodski
(1)
Ilya Mironov
(2)
Ivan Visconti
(1)
Jean-Sébastien Coron
(1)
Jens Groth
(4)
Jiaxin Guan
(1)
Joe Zimmerman
(1)
John Bethencourt
(1)
Jonathan Katz
(3)
Jürg Wullschleger
(1)
Kaartik Bhushan
(1)
Katsuyuki Takashima
(1)
Ke Yang
(1)
Kevin Lewi
(1)
Manoj Prabhakaran
(13)
Mariana Raykova
(2)
Mark Zhandry
(6)
Mehdi Tibouchi
(1)
Mihir Bellare
(2)
Mohammad Mahmoody
(2)
Moni Naor
(1)
Moti Yung
(1)
Muthuramakrishnan Venkitasubramaniam
(1)
Nathan Manohar
(6)
Neekon Vafa
(1)
Nir Bitansky
(1)
Nishanth Chandran
(1)
Oded Goldreich
(2)
Omer Paneth
(2)
Omkant Pandey
(6)
Paul Lou
(7)
Peter M. R. Rasmussen
(2)
Prabhanjan Ananth
(8)
Prabhanjan Vijendra Ananth
(2)
Pratish Datta
(1)
Pratyay Mukherjee
(1)
Pravesh Kothari
(1)
Rafael Pass
(2)
Rafail Ostrovsky
(13)
Ramarathnam Venkatesan
(1)
Ran Canetti
(2)
Ravi Kumar
(1)
Rex Fernando
(4)
Riddhi Ghosal
(3)
Romain Gay
(1)
Ronald L. Rivest
(1)
Rosario Gennaro
(1)
Russell Impagliazzo
(1)
Ryan Moriarty
(1)
S. Dov Gordon
(2)
Saikrishna Badrinarayanan
(13)
Salil P. Vadhan
(4)
Sam Kim
(1)
Samuel B. Hopkins
(1)
Sanjam Garg
(12)
Shafi Goldwasser
(1)
Shai Halevi
(6)
Shashank Agrawal
(1)
Shien Jin Ong
(1)
Shweta Agrawal
(3)
Sridhar Rajagopalan
(1)
Stanislaw Jarecki
(1)
Stefan Wolf
(1)
Steve Lu
(3)
Steven Goldfeder
(1)
Steven Rudich
(1)
Surya Mathialagan
(1)
Susan Hohenberger
(2)
Tal Moran
(1)
Tancrède Lepoint
(1)
Tatsuaki Okamoto
(1)
Thomas Agrikola
(1)
Tibor Jager
(1)
Vanishree Rao
(3)
Venkata Koppula
(2)
Vipul Goyal
(20)
Wei-Lung Dustin Tseng
(1)
Yael Tauman Kalai
(6)
Yevgeniy Dodis
(2)
Yi Deng
(1)
Yuval Ishai
(33)
Zhengzhong Jin
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to