[go: up one dir, main page]

Follow
abhi shelat
abhi shelat
Professor of Computer Science
Verified email at neu.edu - Homepage
Title
Cited by
Cited by
Year
Analysis of the blockchain protocol in asynchronous networks
R Pass, L Seeman, A Shelat
Annual international conference on the theory and applications of …, 2017
9912017
One‐to‐many propensity score matching in cohort studies
JA Rassen, AA Shelat, J Myers, RJ Glynn, KJ Rothman, S Schneeweiss
Pharmacoepidemiology and drug safety 21, 69-80, 2012
5312012
The smallest grammar problem
M Charikar, E Lehman, D Liu, R Panigrahy, M Prabhakaran, A Sahai, ...
IEEE Transactions on Information Theory 51 (7), 2554-2576, 2005
5062005
Doubly-efficient zkSNARKs without trusted setup
RS Wahby, I Tzialla, A Shelat, J Thaler, M Walfish
2018 IEEE Symposium on Security and Privacy (SP), 926-943, 2018
4792018
Efficient protocols for set membership and range proofs
J Camenisch, R Chaabouni, A Shelat
International Conference on the Theory and Application of Cryptology and …, 2008
4342008
{Billion-Gate} secure computation with malicious adversaries
B Kreuter, A Shelat, CH Shen
21st USENIX Security Symposium (USENIX Security 12), 285-300, 2012
403*2012
Remembrance of data passed: A study of disk sanitization practices
SL Garfinkel, A Shelat
IEEE Security & Privacy 1 (1), 17-27, 2003
3352003
Simulatable adaptive oblivious transfer
J Camenisch, G Neven, abhi shelat
Advances in Cryptology-EUROCRYPT 2007, 573-590, 2007
3242007
Securely obfuscating re-encryption
S Hohenberger, GN Rothblum, abhi shelat, V Vaikuntanathan
Theory of Cryptography, 233-252, 2007
290*2007
Scaling ORAM for secure computation
J Doerner, A Shelat
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2762017
Secure two-party threshold ECDSA from ECDSA assumptions
J Doerner, Y Kondi, E Lee, A Shelat
2018 IEEE Symposium on Security and Privacy (SP), 980-997, 2018
2412018
Threshold ECDSA from ECDSA assumptions: The multiparty case
J Doerner, Y Kondi, E Lee, A Shelat
2019 IEEE Symposium on Security and Privacy (SP), 1051-1066, 2019
2292019
SCORAM: oblivious RAM for secure computation
XS Wang, Y Huang, THH Chan, A Shelat, E Shi
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
2122014
A better method to analyze blockchain consistency
L Kiffer, R Rajaraman, A Shelat
Proceedings of the 2018 acm sigsac conference on computer and communications …, 2018
1992018
Matching by propensity score in cohort studies with three treatment groups
JA Rassen, AA Shelat, JM Franklin, RJ Glynn, DH Solomon, ...
Epidemiology 24 (3), 401-409, 2013
1972013
Computing on authenticated data
JH Ahn, D Boneh, J Camenisch, S Hohenberger, A Shelat, B Waters
Theory of Cryptography Conference, 1-20, 2012
1512012
Two-output secure computation with malicious adversaries
C Shen, A Shelat
Advances in Cryptology–EUROCRYPT 2011, 386-405, 2011
147*2011
Privacy and identity management for everyone
J Camenisch, A Shelat, D Sommer, S Fischer-Hübner, M Hansen, ...
Proceedings of the 2005 workshop on Digital identity management, 20-27, 2005
1462005
Micropayments for decentralized currencies
R Pass, A Shelat
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1282015
Bounded CCA2-secure encryption
R Cramer, G Hanaoka, D Hofheinz, H Imai, E Kiltz, R Pass, A Shelat, ...
International Conference on the Theory and Application of Cryptology and …, 2007
1192007
The system can't perform the operation now. Try again later.
Articles 1–20