One-to-many propensity score matching in cohort studies
Rassen, Jeremy A., Shelat, Abhi A., Myers, Jessica, Glynn, Robert J., Rothman, Kenneth J., Schneeweiss, Sebastian
Published in Pharmacoepidemiology and drug safety (01.05.2012)
Published in Pharmacoepidemiology and drug safety (01.05.2012)
Get full text
Journal Article
Doubly-Efficient zkSNARKs Without Trusted Setup
Wahby, Riad S., Tzialla, Ioanna, Shelat, Abhi, Thaler, Justin, Walfish, Michael
Published in 2018 IEEE Symposium on Security and Privacy (SP) (01.05.2018)
Published in 2018 IEEE Symposium on Security and Privacy (SP) (01.05.2018)
Get full text
Conference Proceeding
Multiparty Generation of an RSA Modulus
Chen, Megan, Doerner, Jack, Kondi, Yashvanth, Lee, Eysa, Rosefield, Schuyler, Shelat, Abhi, Cohen, Ran
Published in Journal of cryptology (01.04.2022)
Published in Journal of cryptology (01.04.2022)
Get full text
Journal Article
Efficient Protocols for Set Membership and Range Proofs
Camenisch, Jan, Chaabouni, Rafik, shelat, abhi
Published in Advances in Cryptology - ASIACRYPT 2008 (2008)
Published in Advances in Cryptology - ASIACRYPT 2008 (2008)
Get full text
Book Chapter
Computing on Authenticated Data
Ahn, Jae Hyun, Boneh, Dan, Camenisch, Jan, Hohenberger, Susan, Shelat, Abhi, Waters, Brent
Published in Journal of cryptology (01.04.2015)
Published in Journal of cryptology (01.04.2015)
Get full text
Journal Article
Securely Obfuscating Re-Encryption
Hohenberger, Susan, Rothblum, Guy N., Shelat, Abhi, Vaikuntanathan, Vinod
Published in Journal of cryptology (01.10.2011)
Published in Journal of cryptology (01.10.2011)
Get full text
Journal Article
Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One
Pass, Rafael, shelat, abhi, Vaikuntanathan, Vinod
Published in Advances in Cryptology - CRYPTO 2006 (2006)
Published in Advances in Cryptology - CRYPTO 2006 (2006)
Get full text
Book Chapter
Conference Proceeding
Secure Two-party Threshold ECDSA from ECDSA Assumptions
Doerner, Jack, Kondi, Yashvanth, Lee, Eysa, Shelat, Abhi
Published in 2018 IEEE Symposium on Security and Privacy (SP) (01.05.2018)
Published in 2018 IEEE Symposium on Security and Privacy (SP) (01.05.2018)
Get full text
Conference Proceeding
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case
Doerner, Jack, Kondi, Yashvanth, Lee, Eysa, Shelat, Abhi
Published in 2019 IEEE Symposium on Security and Privacy (SP) (01.05.2019)
Published in 2019 IEEE Symposium on Security and Privacy (SP) (01.05.2019)
Get full text
Conference Proceeding
Threshold ECDSA in Three Rounds
Doerner, Jack, Kondi, Yashvanth, Lee, Eysa, Shelat, Abhi
Published in 2024 IEEE Symposium on Security and Privacy (SP) (19.05.2024)
Published in 2024 IEEE Symposium on Security and Privacy (SP) (19.05.2024)
Get full text
Conference Proceeding
Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance
Doerner, Jack, Kondi, Yashvanth, Lee, Eysa, Shelat, Abhi, Tyner, LaKyah
Published in 2023 IEEE Symposium on Security and Privacy (SP) (01.05.2023)
Published in 2023 IEEE Symposium on Security and Privacy (SP) (01.05.2023)
Get full text
Conference Proceeding
Verifiable ASICs
Wahby, Riad S., Howald, Max, Garg, Siddharth, Shelat, Abhi, Walfish, Michael
Published in 2016 IEEE Symposium on Security and Privacy (SP) (01.05.2016)
Published in 2016 IEEE Symposium on Security and Privacy (SP) (01.05.2016)
Get full text
Conference Proceeding
Journal Article
Blind Certificate Authorities
Wang, Liang, Asharov, Gilad, Pass, Rafael, Ristenpart, Thomas, Shelat, Abhi
Published in 2019 IEEE Symposium on Security and Privacy (SP) (01.05.2019)
Published in 2019 IEEE Symposium on Security and Privacy (SP) (01.05.2019)
Get full text
Conference Proceeding
The smallest grammar problem
Charikar, M., Lehman, E., Ding Liu, Panigrahy, R., Prabhakaran, M., Sahai, A., Shelat, A.
Published in IEEE transactions on information theory (01.07.2005)
Published in IEEE transactions on information theory (01.07.2005)
Get full text
Journal Article
Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority
Chen, Megan, Hazay, Carmit, Ishai, Yuval, Kashnikov, Yuriy, Micciancio, Daniele, Riviere, Tarik, Shelat, Abhi, Venkitasubramaniam, Muthu, Wang, Ruihan
Published in 2021 IEEE Symposium on Security and Privacy (SP) (01.05.2021)
Published in 2021 IEEE Symposium on Security and Privacy (SP) (01.05.2021)
Get full text
Conference Proceeding