abhi shelat
abhi shelat
Professor of Computer Science
Verified email at - Homepage
Cited by
Cited by
Analysis of the blockchain protocol in asynchronous networks
R Pass, L Seeman, A Shelat
Annual international conference on the theory and applications of …, 2017
The smallest grammar problem
M Charikar, E Lehman, D Liu, R Panigrahy, M Prabhakaran, A Sahai, ...
IEEE Transactions on Information Theory 51 (7), 2554-2576, 2005
One‐to‐many propensity score matching in cohort studies
JA Rassen, AA Shelat, J Myers, RJ Glynn, KJ Rothman, S Schneeweiss
Pharmacoepidemiology and drug safety 21, 69-80, 2012
Efficient protocols for set membership and range proofs
J Camenisch, R Chaabouni, A Shelat
International Conference on the Theory and Application of Cryptology and …, 2008
{Billion-Gate} secure computation with malicious adversaries
B Kreuter, A Shelat, CH Shen
21st USENIX Security Symposium (USENIX Security 12), 285-300, 2012
Doubly-efficient zkSNARKs without trusted setup
RS Wahby, I Tzialla, A Shelat, J Thaler, M Walfish
2018 IEEE Symposium on Security and Privacy (SP), 926-943, 2018
Remembrance of data passed: A study of disk sanitization practices
SL Garfinkel, A Shelat
IEEE Security & Privacy 1 (1), 17-27, 2003
Simulatable adaptive oblivious transfer
J Camenisch, G Neven, abhi shelat
Advances in Cryptology-EUROCRYPT 2007, 573-590, 2007
Securely obfuscating re-encryption
S Hohenberger, GN Rothblum, abhi shelat, V Vaikuntanathan
Theory of Cryptography, 233-252, 2007
Scaling ORAM for secure computation
J Doerner, A Shelat
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
SCORAM: oblivious RAM for secure computation
XS Wang, Y Huang, THH Chan, A Shelat, E Shi
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Matching by propensity score in cohort studies with three treatment groups
JA Rassen, AA Shelat, JM Franklin, RJ Glynn, DH Solomon, ...
Epidemiology 24 (3), 401-409, 2013
A better method to analyze blockchain consistency
L Kiffer, R Rajaraman, A Shelat
Proceedings of the 2018 acm sigsac conference on computer and communications …, 2018
Secure two-party threshold ECDSA from ECDSA assumptions
J Doerner, Y Kondi, E Lee, A Shelat
2018 IEEE Symposium on Security and Privacy (SP), 980-997, 2018
Computing on authenticated data
JH Ahn, D Boneh, J Camenisch, S Hohenberger, A Shelat, B Waters
Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012 …, 2012
Threshold ECDSA from ECDSA assumptions: The multiparty case
J Doerner, Y Kondi, E Lee, A Shelat
2019 IEEE Symposium on Security and Privacy (SP), 1051-1066, 2019
Privacy and identity management for everyone
J Camenisch, A Shelat, D Sommer, S Fischer-Hübner, M Hansen, ...
Proceedings of the 2005 workshop on Digital identity management, 20-27, 2005
Two-output secure computation with malicious adversaries
C Shen, A Shelat
Advances in Cryptology–EUROCRYPT 2011, 386-405, 2011
Approximation algorithms for grammar-based compression
E Lehman, A Shelat
Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete …, 2002
Bounded CCA2-secure encryption
R Cramer, G Hanaoka, D Hofheinz, H Imai, E Kiltz, R Pass, A Shelat, ...
Advances in Cryptology–ASIACRYPT 2007: 13th International Conference on the …, 2007
The system can't perform the operation now. Try again later.
Articles 1–20