What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Shafi Goldwasser
Google Scholar
51
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/crypto
Certifying Private Probabilistic Mechanisms.
Zoë Ruha Bell
Shafi Goldwasser
Michael P. Kim
Jean-Luc Watson
2021
conf/crypto
Deniable Fully Homomorphic Encryption from Learning with Errors.
Shweta Agrawal
Shafi Goldwasser
Saleet Mossel
2020
conf/eurocrypt
Formalizing Data Deletion in the Context of the Right to Be Forgotten.
Sanjam Garg
Shafi Goldwasser
Prashant Nalini Vasudevan
2018
conf/uss
Practical Accountability of Secret Processes.
Jonathan Frankle
Sunoo Park
Daniel Shaar
Shafi Goldwasser
Daniel J. Weitzner
2017
journals/joc
The Hunting of the SNARK.
Nir Bitansky
Ran Canetti
Alessandro Chiesa
Shafi Goldwasser
Huijia Lin
Aviad Rubinstein
Eran Tromer
2017
conf/tcc
The Edited Truth.
Shafi Goldwasser
Saleet Klein
Daniel Wichs
2016
conf/tcc
Cryptographic Assumptions: A Position Paper.
Shafi Goldwasser
Yael Tauman Kalai
2015
conf/ndss
Machine Learning Classification over Encrypted Data.
Raphael Bost
Raluca Ada Popa
Stephen Tu
Shafi Goldwasser
2015
conf/tcc
Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation.
Ran Canetti
Shafi Goldwasser
Oxana Poburinnaya
2015
conf/tcc
Aggregate Pseudorandom Functions and Connections to Learning.
Aloni Cohen
Shafi Goldwasser
Vinod Vaikuntanathan
2014
journals/joc
On Best-Possible Obfuscation.
Shafi Goldwasser
Guy N. Rothblum
2014
conf/crypto
The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator.
Nir Bitansky
Ran Canetti
Henry Cohn
Shafi Goldwasser
Yael Tauman Kalai
Omer Paneth
Alon Rosen
2014
conf/pkc
Functional Signatures and Pseudorandom Functions.
Elette Boyle
Shafi Goldwasser
Ioana Ivan
2014
conf/eurocrypt
Multi-input Functional Encryption.
Shafi Goldwasser
S. Dov Gordon
Vipul Goyal
Abhishek Jain
Jonathan Katz
Feng-Hao Liu
Amit Sahai
Elaine Shi
Hong-Sheng Zhou
2013
conf/crypto
How to Run Turing Machines on Encrypted Data.
Shafi Goldwasser
Yael Tauman Kalai
Raluca A. Popa
Vinod Vaikuntanathan
Nickolai Zeldovich
2013
conf/tcc
Communication Locality in Secure Multi-party Computation - How to Run Sublinear Algorithms in a Distributed Setting.
Elette Boyle
Shafi Goldwasser
Stefano Tessaro
2012
conf/tcc
Bounded-Collusion IBE from Key Homomorphism.
Shafi Goldwasser
Allison B. Lewko
David A. Wilson
2011
conf/asiacrypt
Program Obfuscation with Leaky Hardware.
Nir Bitansky
Ran Canetti
Shafi Goldwasser
Shai Halevi
Yael Tauman Kalai
Guy N. Rothblum
2011
conf/tcc
Black-Box Circular-Secure Encryption beyond Affine Functions.
Zvika Brakerski
Shafi Goldwasser
Yael Tauman Kalai
2010
conf/crypto
Securing Computation against Continuous Leakage.
Shafi Goldwasser
Guy N. Rothblum
2010
conf/crypto
Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability - (or: Quadratic Residuosity Strikes Back).
Zvika Brakerski
Shafi Goldwasser
2010
conf/tcc
Public-Key Encryption Schemes with Auxiliary Inputs.
Yevgeniy Dodis
Shafi Goldwasser
Yael Tauman Kalai
Chris Peikert
Vinod Vaikuntanathan
2009
conf/eurocrypt
Cryptography without (Hardly Any) Secrets ?
Shafi Goldwasser
2009
conf/tcc
Simultaneous Hardcore Bits and Cryptography against Memory Attacks.
Adi Akavia
Shafi Goldwasser
Vinod Vaikuntanathan
2009
conf/tcc
Weak Verifiable Random Functions.
Zvika Brakerski
Shafi Goldwasser
Guy N. Rothblum
Vinod Vaikuntanathan
2008
conf/crypto
One-Time Programs.
Shafi Goldwasser
Yael Tauman Kalai
Guy N. Rothblum
2008
conf/ctrsa
Program Obfuscation and One-Time Programs.
Shafi Goldwasser
2007
conf/eurocrypt
Secure Computation from Random Error Correcting Codes.
Hao Chen
Ronald Cramer
Shafi Goldwasser
Robbert de Haan
Vinod Vaikuntanathan
2007
conf/tcc
On Best-Possible Obfuscation.
Shafi Goldwasser
Guy N. Rothblum
2005
journals/joc
Secure Multi-Party Computation without Agreement.
Shafi Goldwasser
Yehuda Lindell
2005
conf/tcc
Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem.
Shafi Goldwasser
Dmitriy Kharchenko
2004
conf/tcc
Transformation of Digital Signature Schemes into Designated Confirmer Signature Schemes.
Shafi Goldwasser
Erez Waisbard
2001
conf/eurocrypt
Identification Protocols Secure against Reset Attacks.
Mihir Bellare
Marc Fischlin
Shafi Goldwasser
Silvio Micali
1999
conf/eurocrypt
Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack.
Ran Canetti
Shafi Goldwasser
1997
conf/ccs
Verifiable Partial Key Escrow.
Mihir Bellare
Shafi Goldwasser
1997
conf/crypto
Public-Key Cryptosystems from Lattice Reduction Problems.
Oded Goldreich
Shafi Goldwasser
Shai Halevi
1997
conf/crypto
Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem.
Oded Goldreich
Shafi Goldwasser
Shai Halevi
1997
conf/crypto
"Pseudo-Random" Number Generation Within Cryptographic Algorithms: The DDS Case.
Mihir Bellare
Shafi Goldwasser
Daniele Micciancio
1994
conf/crypto
Incremental Cryptography: The Case of Hashing and Signing.
Mihir Bellare
Oded Goldreich
Shafi Goldwasser
1992
conf/crypto
Invariant Signatures and Non-Interactive Zero-Knowledge Proofs are Equivalent (Extended Abstract).
Shafi Goldwasser
Rafail Ostrovsky
1990
conf/crypto
Fair Computation of General Functions in Presence of Immoral Majority.
Shafi Goldwasser
Leonid A. Levin
1989
conf/crypto
Efficient Identification Schemes Using Two Prover Interactive Proofs.
Michael Ben-Or
Shafi Goldwasser
Joe Kilian
Avi Wigderson
1989
conf/crypto
On the Structure of Secret Key Exchange Protocols.
Mihir Bellare
Lenore Cowen
Shafi Goldwasser
1989
conf/crypto
Multiparty Computation with Faulty Majority.
Donald Beaver
Shafi Goldwasser
1989
conf/crypto
New Paradigms for Digital Signatures and Message Authentication Based on Non-Interative Zero Knowledge Proofs.
Mihir Bellare
Shafi Goldwasser
1988
conf/crypto
Everything Provable is Provable in Zero-Knowledge.
Michael Ben-Or
Oded Goldreich
Shafi Goldwasser
Johan Håstad
Joe Kilian
Silvio Micali
Phillip Rogaway
1985
conf/crypto
The Bit Security of Modular Squaring Given Partial Factorization of the Modulos.
Benny Chor
Oded Goldreich
Shafi Goldwasser
1984
conf/crypto
An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information.
Manuel Blum
Shafi Goldwasser
1984
conf/crypto
On the Cryptographic Applications of Random Functions.
Oded Goldreich
Shafi Goldwasser
Silvio Micali
1984
conf/crypto
A "Paradoxical'"Solution to the Signature Problem (Abstract).
Shafi Goldwasser
Silvio Micali
Ronald L. Rivest
1982
conf/crypto
On Signatures and Authentication.
Shafi Goldwasser
Silvio Micali
Andrew Chi-Chih Yao
Coauthors
Abhishek Jain
(1)
Adi Akavia
(1)
Alessandro Chiesa
(1)
Allison B. Lewko
(1)
Alon Rosen
(1)
Aloni Cohen
(1)
Amit Sahai
(1)
Andrew Chi-Chih Yao
(1)
Avi Wigderson
(1)
Aviad Rubinstein
(1)
Benny Chor
(1)
Chris Peikert
(1)
Daniel J. Weitzner
(1)
Daniel Shaar
(1)
Daniel Wichs
(1)
Daniele Micciancio
(1)
David A. Wilson
(1)
Dmitriy Kharchenko
(1)
Donald Beaver
(1)
Elaine Shi
(1)
Elette Boyle
(2)
Eran Tromer
(1)
Erez Waisbard
(1)
Feng-Hao Liu
(1)
Guy N. Rothblum
(6)
Hao Chen
(1)
Henry Cohn
(1)
Hong-Sheng Zhou
(1)
Huijia Lin
(1)
Ioana Ivan
(1)
Jean-Luc Watson
(1)
Joe Kilian
(2)
Johan Håstad
(1)
Jonathan Frankle
(1)
Jonathan Katz
(1)
Lenore Cowen
(1)
Leonid A. Levin
(1)
Manuel Blum
(1)
Marc Fischlin
(1)
Michael Ben-Or
(2)
Michael P. Kim
(1)
Mihir Bellare
(6)
Nickolai Zeldovich
(1)
Nir Bitansky
(3)
Oded Goldreich
(6)
Omer Paneth
(1)
Oxana Poburinnaya
(1)
Phillip Rogaway
(1)
Prashant Nalini Vasudevan
(1)
Rafail Ostrovsky
(1)
Raluca A. Popa
(1)
Raluca Ada Popa
(1)
Ran Canetti
(5)
Raphael Bost
(1)
Robbert de Haan
(1)
Ronald Cramer
(1)
Ronald L. Rivest
(1)
S. Dov Gordon
(1)
Saleet Klein
(1)
Saleet Mossel
(1)
Sanjam Garg
(1)
Shafi Goldwasser
(51)
Shai Halevi
(3)
Shweta Agrawal
(1)
Silvio Micali
(5)
Stefano Tessaro
(1)
Stephen Tu
(1)
Sunoo Park
(1)
Vinod Vaikuntanathan
(6)
Vipul Goyal
(1)
Yael Tauman Kalai
(7)
Yehuda Lindell
(1)
Yevgeniy Dodis
(1)
Zoë Ruha Bell
(1)
Zvika Brakerski
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to