Analysis of the blockchain protocol in asynchronous networks R Pass, L Seeman, A Shelat Annual International Conference on the Theory and Applications of …, 2017 | 472 | 2017 |
The smallest grammar problem M Charikar, E Lehman, D Liu, R Panigrahy, M Prabhakaran, A Sahai, ... IEEE Transactions on Information Theory 51 (7), 2554-2576, 2005 | 356 | 2005 |
Billion-gate secure computation with malicious adversaries B Kreuter, A Shelat, CH Shen 21st {USENIX} Security Symposium ({USENIX} Security 12), 285-300, 2012 | 264 | 2012 |
Efficient protocols for set membership and range proofs J Camenisch, R Chaabouni International Conference on the Theory and Application of Cryptology and …, 2008 | 262 | 2008 |
Simulatable adaptive oblivious transfer J Camenisch, G Neven, abhi shelat Advances in Cryptology-EUROCRYPT 2007, 573-590, 2007 | 262 | 2007 |
Securely obfuscating re-encryption S Hohenberger, GN Rothblum, abhi shelat, V Vaikuntanathan Theory of Cryptography, 233-252, 2007 | 260* | 2007 |
Remembrance of data passed: A study of disk sanitization practices SL Garfinkel, A Shelat IEEE Security & Privacy 1 (1), 17-27, 2003 | 257 | 2003 |
One‐to‐many propensity score matching in cohort studies JA Rassen, AA Shelat, J Myers, RJ Glynn, KJ Rothman, S Schneeweiss Pharmacoepidemiology and drug safety 21, 69-80, 2012 | 227 | 2012 |
SCORAM: oblivious RAM for secure computation XS Wang, Y Huang, THH Chan, A Shelat, E Shi Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 152 | 2014 |
{PCF}: A Portable Circuit Format for Scalable Two-Party Secure Computation B Kreuter, A Shelat, B Mood, K Butler 22nd {USENIX} Security Symposium ({USENIX} Security 13), 321-336, 2013 | 133 | 2013 |
Privacy and identity management for everyone J Camenisch, A Shelat, D Sommer, S Fischer-Hübner, M Hansen, ... Proceedings of the 2005 workshop on Digital identity management, 20-27, 2005 | 131 | 2005 |
Matching by propensity score in cohort studies with three treatment groups JA Rassen, AA Shelat, JM Franklin, RJ Glynn, DH Solomon, ... Epidemiology, 401-409, 2013 | 112 | 2013 |
Two-output secure computation with malicious adversaries C Shen, A Shelat Advances in Cryptology–EUROCRYPT 2011, 386-405, 2011 | 111 | 2011 |
Approximation algorithms for grammar-based compression E Lehman, A Shelat Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete …, 2002 | 99 | 2002 |
Completely fair SFE and coalition-safe cheap talk M Lepinski, S Micali, C Peikert, A Shelat Proceedings of the twenty-third annual ACM symposium on Principles of …, 2004 | 97 | 2004 |
Doubly-efficient zkSNARKs without trusted setup RS Wahby, I Tzialla, A Shelat, J Thaler, M Walfish 2018 IEEE Symposium on Security and Privacy (SP), 926-943, 2018 | 95 | 2018 |
Bounded CCA2-secure encryption R Cramer, G Hanaoka, D Hofheinz, H Imai, E Kiltz, R Pass, A Shelat, ... International Conference on the Theory and Application of Cryptology and …, 2007 | 89 | 2007 |
Collusion-free protocols M Lepinksi, S Micali, A Shelat Proceedings of the thirty-seventh annual ACM symposium on Theory of …, 2005 | 87* | 2005 |
Approximating the smallest grammar: Kolmogorov complexity in natural models M Charikar, E Lehman, D Liu, R Panigrahy, M Prabhakaran, A Rasala, ... Proceedings of the thiry-fourth annual ACM symposium on Theory of computing …, 2002 | 75 | 2002 |
Scaling ORAM for secure computation J Doerner, A Shelat Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 74 | 2017 |