What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yael Tauman Kalai
Google Scholar
43
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurocrypt
Somewhat Homomorphic Encryption from Linear Homomorphism and Sparse LPN.
Henry Corrigan-Gibbs
Alexandra Henzinger
Yael Tauman Kalai
Vinod Vaikuntanathan
2023
conf/crypto
SNARGs for Monotone Policy Batch NP.
Zvika Brakerski
Maya Farber Brodsky
Yael Tauman Kalai
Alex Lombardi
Omer Paneth
2023
conf/eurocrypt
SNARGs and PPAD Hardness from the Decisional Diffie-Hellman Assumption.
Yael Tauman Kalai
Alex Lombardi
Vinod Vaikuntanathan
2022
conf/crypto
Succinct Classical Verification of Quantum Computation.
James Bartusek
Yael Tauman Kalai
Alex Lombardi
Fermi Ma
Giulio Malavolta
Vinod Vaikuntanathan
Thomas Vidick
Lisa Yang
2022
conf/crypto
Constructive Post-Quantum Reductions.
Nir Bitansky
Zvika Brakerski
Yael Tauman Kalai
2022
conf/tcc
Verifiable Private Information Retrieval.
Shany Ben-David
Yael Tauman Kalai
Omer Paneth
2021
conf/tcc
Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs.
Yael Tauman Kalai
Vinod Vaikuntanathan
Rachel Yun Zhang
2020
conf/crypto
Delegation with Updatable Unambiguous Proofs and PPAD-Hardness.
Yael Tauman Kalai
Omer Paneth
Lisa Yang
2020
conf/eurocrypt
Low Error Efficient Computational Extractors in the CRS Model.
Ankit Garg
Yael Tauman Kalai
Dakshita Khurana
2019
conf/crypto
Non-interactive Non-malleability from Quantum Supremacy.
Yael Tauman Kalai
Dakshita Khurana
2019
conf/tcc
Fully Homomorphic NIZK and NIWI Proofs.
Prabhanjan Ananth
Apoorvaa Deshpande
Yael Tauman Kalai
Anna Lysyanskaya
2018
conf/crypto
Promise Zero Knowledge and Its Applications to Round Optimal MPC.
Saikrishna Badrinarayanan
Vipul Goyal
Abhishek Jain
Yael Tauman Kalai
Dakshita Khurana
Amit Sahai
2018
conf/eurocrypt
Statistical Witness Indistinguishability (and more) in Two Messages.
Yael Tauman Kalai
Dakshita Khurana
Amit Sahai
2017
conf/crypto
Distinguisher-Dependent Simulation in Two Rounds and its Applications.
Abhishek Jain
Yael Tauman Kalai
Dakshita Khurana
Ron Rothblum
2017
conf/crypto
From Obfuscation to the Security of Fiat-Shamir for Proofs.
Yael Tauman Kalai
Guy N. Rothblum
Ron D. Rothblum
2017
conf/asiacrypt
Succinct Spooky Free Compilers Are Not Black Box Sound.
Zvika Brakerski
Yael Tauman Kalai
Renen Perlman
2016
conf/tcc
Cryptographic Assumptions: A Position Paper.
Shafi Goldwasser
Yael Tauman Kalai
2016
conf/tcc
Delegating RAM Computations.
Yael Tauman Kalai
Omer Paneth
2016
conf/tcc
3-Message Zero Knowledge Against Human Ignorance.
Nir Bitansky
Zvika Brakerski
Yael Tauman Kalai
Omer Paneth
Vinod Vaikuntanathan
2015
conf/crypto
Arguments of Proximity - [Extended Abstract].
Yael Tauman Kalai
Ron D. Rothblum
2015
conf/tcc
On Obfuscation with Random Oracles.
Ran Canetti
Yael Tauman Kalai
Omer Paneth
2014
conf/crypto
On Virtual Grey Box Obfuscation for General Circuits.
Nir Bitansky
Ran Canetti
Yael Tauman Kalai
Omer Paneth
2014
conf/crypto
The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator.
Nir Bitansky
Ran Canetti
Henry Cohn
Shafi Goldwasser
Yael Tauman Kalai
Omer Paneth
Alon Rosen
2014
conf/eurocrypt
Protecting Obfuscation against Algebraic Attacks.
Boaz Barak
Sanjam Garg
Yael Tauman Kalai
Omer Paneth
Amit Sahai
2014
conf/tcc
Obfuscation for Evasive Functions.
Boaz Barak
Nir Bitansky
Ran Canetti
Yael Tauman Kalai
Omer Paneth
Amit Sahai
2014
conf/tcc
Securing Circuits and Protocols against 1/poly(k) Tampering Rate.
Dana Dachman-Soled
Yael Tauman Kalai
2013
conf/crypto
Secure Computation against Adaptive Auxiliary Information.
Elette Boyle
Sanjam Garg
Abhishek Jain
Yael Tauman Kalai
Amit Sahai
2013
conf/crypto
How to Run Turing Machines on Encrypted Data.
Shafi Goldwasser
Yael Tauman Kalai
Raluca A. Popa
Vinod Vaikuntanathan
Nickolai Zeldovich
2013
conf/tcc
Why "Fiat-Shamir for Proofs" Lacks a Proof.
Nir Bitansky
Dana Dachman-Soled
Sanjam Garg
Abhishek Jain
Yael Tauman Kalai
Adriana López-Alt
Daniel Wichs
2012
journals/joc
Smooth Projective Hashing and Two-Message Oblivious Transfer.
Shai Halevi
Yael Tauman Kalai
2012
conf/crypto
Securing Circuits against Constant-Rate Tampering.
Dana Dachman-Soled
Yael Tauman Kalai
2012
conf/tcc
A Parallel Repetition Theorem for Leakage Resilience.
Zvika Brakerski
Yael Tauman Kalai
2011
conf/crypto
Memory Delegation.
Kai-Min Chung
Yael Tauman Kalai
Feng-Hao Liu
Ran Raz
2011
conf/crypto
Cryptography with Tamperable and Leaky Memory.
Yael Tauman Kalai
Bhavana Kanukurthi
Amit Sahai
2011
conf/asiacrypt
Program Obfuscation with Leaky Hardware.
Nir Bitansky
Ran Canetti
Shafi Goldwasser
Shai Halevi
Yael Tauman Kalai
Guy N. Rothblum
2011
conf/tcc
Black-Box Circular-Secure Encryption beyond Affine Functions.
Zvika Brakerski
Shafi Goldwasser
Yael Tauman Kalai
2010
conf/crypto
Improved Delegation of Computation Using Fully Homomorphic Encryption.
Kai-Min Chung
Yael Tauman Kalai
Salil P. Vadhan
2010
conf/tcc
Public-Key Encryption Schemes with Auxiliary Inputs.
Yevgeniy Dodis
Shafi Goldwasser
Yael Tauman Kalai
Chris Peikert
Vinod Vaikuntanathan
2010
conf/tcc
On Symmetric Encryption and Point Obfuscation.
Ran Canetti
Yael Tauman Kalai
Mayank Varia
Daniel Wichs
2009
conf/crypto
Probabilistically Checkable Arguments.
Yael Tauman Kalai
Ran Raz
2008
conf/crypto
One-Time Programs.
Shafi Goldwasser
Yael Tauman Kalai
Guy N. Rothblum
2007
journals/joc
Concurrent Composition of Secure Protocols in the Timing Model.
Yael Tauman Kalai
Yehuda Lindell
Manoj Prabhakaran
2005
conf/eurocrypt
Smooth Projective Hashing and Two-Message Oblivious Transfer.
Yael Tauman Kalai
Coauthors
Abhishek Jain
(4)
Adriana López-Alt
(1)
Alex Lombardi
(3)
Alexandra Henzinger
(1)
Alon Rosen
(1)
Amit Sahai
(6)
Ankit Garg
(1)
Anna Lysyanskaya
(1)
Apoorvaa Deshpande
(1)
Bhavana Kanukurthi
(1)
Boaz Barak
(2)
Chris Peikert
(1)
Dakshita Khurana
(5)
Dana Dachman-Soled
(3)
Daniel Wichs
(2)
Elette Boyle
(1)
Feng-Hao Liu
(1)
Fermi Ma
(1)
Giulio Malavolta
(1)
Guy N. Rothblum
(3)
Henry Cohn
(1)
Henry Corrigan-Gibbs
(1)
James Bartusek
(1)
Kai-Min Chung
(2)
Lisa Yang
(2)
Manoj Prabhakaran
(1)
Maya Farber Brodsky
(1)
Mayank Varia
(1)
Nickolai Zeldovich
(1)
Nir Bitansky
(7)
Omer Paneth
(10)
Prabhanjan Ananth
(1)
Rachel Yun Zhang
(1)
Raluca A. Popa
(1)
Ran Canetti
(6)
Ran Raz
(2)
Renen Perlman
(1)
Ron D. Rothblum
(2)
Ron Rothblum
(1)
Saikrishna Badrinarayanan
(1)
Salil P. Vadhan
(1)
Sanjam Garg
(3)
Shafi Goldwasser
(7)
Shai Halevi
(2)
Shany Ben-David
(1)
Thomas Vidick
(1)
Vinod Vaikuntanathan
(7)
Vipul Goyal
(1)
Yael Tauman Kalai
(43)
Yehuda Lindell
(1)
Yevgeniy Dodis
(1)
Zvika Brakerski
(6)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to