Seguir
Yael Tauman Kalai
Yael Tauman Kalai
Microsoft Research, MIT
Dirección de correo verificada de microsoft.com - Página principal
Título
Citado por
Citado por
Año
How to leak a secret
RL Rivest, A Shamir, Y Tauman
Advances in Cryptology—ASIACRYPT 2001: 7th International Conference on the …, 2001
24912001
Delegating computation: interactive proofs for muggles
S Goldwasser, YT Kalai, GN Rothblum
Journal of the ACM (JACM) 62 (4), 1-64, 2015
8702015
Improved online/offline signature schemes
A Shamir, Y Tauman
Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001
5422001
Reusable garbled circuits and succinct functional encryption
S Goldwasser, Y Kalai, RA Popa, V Vaikuntanathan, N Zeldovich
Proceedings of the forty-fifth annual ACM symposium on Theory of computing …, 2013
5372013
Improved delegation of computation using fully homomorphic encryption
KM Chung, Y Kalai, S Vadhan
Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010
5332010
On the (in) security of the Fiat-Shamir paradigm
S Goldwasser, YT Kalai
44th Annual IEEE Symposium on Foundations of Computer Science, 2003 …, 2003
4662003
One-time programs
S Goldwasser, YT Kalai, GN Rothblum
Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008
3242008
Protecting obfuscation against algebraic attacks
B Barak, S Garg, YT Kalai, O Paneth, A Sahai
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
2962014
Overcoming the hole in the bucket: Public-key cryptography resilient to continual memory leakage
Z Brakerski, YT Kalai, J Katz, V Vaikuntanathan
2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 501-510, 2010
2952010
Public-key encryption schemes with auxiliary inputs
Y Dodis, S Goldwasser, Y Tauman Kalai, C Peikert, V Vaikuntanathan
Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010
2732010
On the impossibility of obfuscation with auxiliary input
S Goldwasser, YT Kalai
46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05), 553-562, 2005
2732005
On cryptography with auxiliary input
Y Dodis, YT Kalai, S Lovett
Proceedings of the forty-first annual ACM symposium on Theory of computing …, 2009
2722009
How to run turing machines on encrypted data
S Goldwasser, YT Kalai, RA Popa, V Vaikuntanathan, N Zeldovich
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
2672013
Robustness of the learning with errors assumption
S Goldwasser, YT Kalai, C Peikert, V Vaikuntanathan
Tsinghua University Press, 2010
2502010
Smooth projective hashing and two-message oblivious transfer
YT Kalai
Annual International Conference on the Theory and Applications of …, 2005
1682005
How to delegate computations: the power of no-signaling proofs
YT Kalai, R Raz, RD Rothblum
ACM Journal of the ACM (JACM) 69 (1), 1-82, 2021
1662021
Memory delegation
KM Chung, YT Kalai, FH Liu, R Raz
Annual Cryptology Conference, 151-168, 2011
1562011
Smooth projective hashing and two-message oblivious transfer
S Halevi, YT Kalai
Journal of Cryptology 25 (1), 158-193, 2012
1492012
How to leak a secret: Theory and applications of ring signatures
RL Rivest, A Shamir, Y Tauman
Theoretical Computer Science: Essays in Memory of Shimon Even, 164-186, 2006
1492006
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
1122006
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20