What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Guy N. Rothblum
Google Scholar
27
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/ccs
Samplable Anonymous Aggregation for Private Federated Data Analysis.
Kunal Talwar
Shan Wang
Audra McMillan
Vitaly Feldman
Pansy Bansal
Bailey Basile
Áine Cahill
Yi Sheng Chan
Mike Chatzidakis
Junye Chen
Oliver R. A. Chick
Mona Chitnis
Suman Ganta
Yusuf Goren
Filip Granqvist
Kristine Guo
Frederic Jacobs
Omid Javidbakht
Albert Liu
Richard Low
Dan Mascenik
Steve Myers
David Park
Wonhee Park
Gianni Parsa
Tommy Pauly
Christian Priebe
Rehan Rishi
Guy N. Rothblum
Congzheng Song
Linmao Song
Karl Tarbe
Sebastian Vogt
Shundong Zhou
Vojta Jina
Michael Scaria
Luke Winstrom
2024
conf/uss
PINE: Efficient Verification of a Euclidean Norm Bound of a Secret-Shared Vector.
Guy N. Rothblum
Eran Omri
Junye Chen
Kunal Talwar
2024
conf/crypto
Constant-Round Arguments for Batch-Verification and Bounded-Space Computations from One-Way Functions.
Noga Amit
Guy N. Rothblum
2023
conf/eurocrypt
Indistinguishable Predictions and Multi-group Fair Learning.
Guy N. Rothblum
2020
conf/tcc
Batch Verification for Statistical Zero Knowledge Proofs.
Inbar Kaslasi
Guy N. Rothblum
Ron D. Rothblum
Adam Sealfon
Prashant Nalini Vasudevan
2020
conf/tcc
Batch Verification and Proofs of Proximity with Polylog Overhead.
Guy N. Rothblum
Ron D. Rothblum
2019
conf/tcc
Incrementally Verifiable Computation via Incremental PCPs.
Moni Naor
Omer Paneth
Guy N. Rothblum
2017
journals/joc
Obfuscating Conjunctions.
Zvika Brakerski
Guy N. Rothblum
2017
conf/crypto
From Obfuscation to the Security of Fiat-Shamir for Proofs.
Yael Tauman Kalai
Guy N. Rothblum
Ron D. Rothblum
2017
conf/tcc
On Zero-Testable Homomorphic Encryption and Publicly Verifiable Non-interactive Arguments.
Omer Paneth
Guy N. Rothblum
2016
conf/crypto
Spooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument Systems.
Cynthia Dwork
Moni Naor
Guy N. Rothblum
2015
conf/asiacrypt
Pure Differential Privacy for Rectangle Queries via Private Partitions.
Cynthia Dwork
Moni Naor
Omer Reingold
Guy N. Rothblum
2014
journals/joc
On Best-Possible Obfuscation.
Shafi Goldwasser
Guy N. Rothblum
2014
conf/tcc
Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding.
Zvika Brakerski
Guy N. Rothblum
2013
conf/crypto
Obfuscating Conjunctions.
Zvika Brakerski
Guy N. Rothblum
2012
conf/crypto
How to Compute under ${\cal{AC}}^{\sf0}$ Leakage without Secure Hardware.
Guy N. Rothblum
2011
journals/joc
Securely Obfuscating Re-Encryption.
Susan Hohenberger
Guy N. Rothblum
Abhi Shelat
Vinod Vaikuntanathan
2011
conf/ccs
Practical delegation of computation using multiple servers.
Ran Canetti
Ben Riva
Guy N. Rothblum
2011
conf/asiacrypt
Program Obfuscation with Leaky Hardware.
Nir Bitansky
Ran Canetti
Shafi Goldwasser
Shai Halevi
Yael Tauman Kalai
Guy N. Rothblum
2010
conf/crypto
Securing Computation against Continuous Leakage.
Shafi Goldwasser
Guy N. Rothblum
2010
conf/tcc
Leakage-Resilient Signatures.
Sebastian Faust
Eike Kiltz
Krzysztof Pietrzak
Guy N. Rothblum
2010
conf/tcc
Obfuscation of Hyperplane Membership.
Ran Canetti
Guy N. Rothblum
Mayank Varia
2009
conf/tcc
How Efficient Can Memory Checking Be?.
Cynthia Dwork
Moni Naor
Guy N. Rothblum
Vinod Vaikuntanathan
2009
conf/tcc
Weak Verifiable Random Functions.
Zvika Brakerski
Shafi Goldwasser
Guy N. Rothblum
Vinod Vaikuntanathan
2008
conf/crypto
One-Time Programs.
Shafi Goldwasser
Yael Tauman Kalai
Guy N. Rothblum
2007
conf/tcc
On Best-Possible Obfuscation.
Shafi Goldwasser
Guy N. Rothblum
2007
conf/tcc
Securely Obfuscating Re-encryption.
Susan Hohenberger
Guy N. Rothblum
Abhi Shelat
Vinod Vaikuntanathan
Coauthors
Abhi Shelat
(2)
Adam Sealfon
(1)
Áine Cahill
(1)
Albert Liu
(1)
Audra McMillan
(1)
Bailey Basile
(1)
Ben Riva
(1)
Christian Priebe
(1)
Congzheng Song
(1)
Cynthia Dwork
(3)
Dan Mascenik
(1)
David Park
(1)
Eike Kiltz
(1)
Eran Omri
(1)
Filip Granqvist
(1)
Frederic Jacobs
(1)
Gianni Parsa
(1)
Guy N. Rothblum
(27)
Inbar Kaslasi
(1)
Junye Chen
(2)
Karl Tarbe
(1)
Kristine Guo
(1)
Krzysztof Pietrzak
(1)
Kunal Talwar
(2)
Linmao Song
(1)
Luke Winstrom
(1)
Mayank Varia
(1)
Michael Scaria
(1)
Mike Chatzidakis
(1)
Mona Chitnis
(1)
Moni Naor
(4)
Nir Bitansky
(1)
Noga Amit
(1)
Oliver R. A. Chick
(1)
Omer Paneth
(2)
Omer Reingold
(1)
Omid Javidbakht
(1)
Pansy Bansal
(1)
Prashant Nalini Vasudevan
(1)
Ran Canetti
(3)
Rehan Rishi
(1)
Richard Low
(1)
Ron D. Rothblum
(3)
Sebastian Faust
(1)
Sebastian Vogt
(1)
Shafi Goldwasser
(6)
Shai Halevi
(1)
Shan Wang
(1)
Shundong Zhou
(1)
Steve Myers
(1)
Suman Ganta
(1)
Susan Hohenberger
(2)
Tommy Pauly
(1)
Vinod Vaikuntanathan
(4)
Vitaly Feldman
(1)
Vojta Jina
(1)
Wonhee Park
(1)
Yael Tauman Kalai
(3)
Yi Sheng Chan
(1)
Yusuf Goren
(1)
Zvika Brakerski
(4)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to