abhi shelat
abhi shelat
Associate professor of computer science
Verified email at neu.edu - Homepage
Title
Cited by
Cited by
Year
Analysis of the blockchain protocol in asynchronous networks
R Pass, L Seeman, A Shelat
Annual International Conference on the Theory and Applications of …, 2017
3842017
The smallest grammar problem
M Charikar, E Lehman, D Liu, R Panigrahy, M Prabhakaran, A Sahai, ...
IEEE Transactions on Information Theory 51 (7), 2554-2576, 2005
3362005
Remembrance of data passed: A study of disk sanitization practices
SL Garfinkel, A Shelat
IEEE Security & Privacy 1 (1), 17-27, 2003
2592003
Simulatable adaptive oblivious transfer
J Camenisch, G Neven, abhi shelat
Advances in Cryptology-EUROCRYPT 2007, 573-590, 2007
2572007
Billion-gate secure computation with malicious adversaries
B Kreuter, A Shelat, CH Shen
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
2542012
Efficient protocols for set membership and range proofs
J Camenisch, R Chaabouni
International Conference on the Theory and Application of Cryptology and …, 2008
2472008
Securely obfuscating re-encryption
S Hohenberger, GN Rothblum, abhi shelat, V Vaikuntanathan
Theory of Cryptography, 233-252, 2007
236*2007
One‐to‐many propensity score matching in cohort studies
JA Rassen, AA Shelat, J Myers, RJ Glynn, KJ Rothman, S Schneeweiss
Pharmacoepidemiology and drug safety 21, 69-80, 2012
2072012
Computing on authenticated data
JH Ahn, D Boneh, J Camenisch, S Hohenberger, A Shelat, B Waters
Journal of Cryptology 28 (2), 351-395, 2015
1352015
SCORAM: oblivious RAM for secure computation
XS Wang, Y Huang, THH Chan, A Shelat, E Shi
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1342014
Privacy and identity management for everyone
J Camenisch, A Shelat, D Sommer, S Fischer-Hübner, M Hansen, ...
Proceedings of the 2005 workshop on Digital identity management, 20-27, 2005
1292005
{PCF}: A Portable Circuit Format for Scalable Two-Party Secure Computation
B Kreuter, A Shelat, B Mood, K Butler
22nd {USENIX} Security Symposium ({USENIX} Security 13), 321-336, 2013
1252013
Two-output secure computation with malicious adversaries
C Shen, A Shelat
Advances in Cryptology–EUROCRYPT 2011, 386-405, 2011
1152011
Matching by propensity score in cohort studies with three treatment groups
JA Rassen, AA Shelat, JM Franklin, RJ Glynn, DH Solomon, ...
Epidemiology, 401-409, 2013
1032013
Approximation algorithms for grammar-based compression
E Lehman, A Shelat
Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete …, 2002
982002
Completely fair SFE and coalition-safe cheap talk
M Lepinski, S Micali, C Peikert, A Shelat
Proceedings of the twenty-third annual ACM symposium on Principles of …, 2004
932004
Bounded CCA2-secure encryption
R Cramer, G Hanaoka, D Hofheinz, H Imai, E Kiltz, R Pass, A Shelat, ...
International Conference on the Theory and Application of Cryptology and …, 2007
872007
Collusion-free protocols
M Lepinksi, S Micali, A Shelat
Proceedings of the thirty-seventh annual ACM symposium on Theory of …, 2005
84*2005
Approximating the smallest grammar: Kolmogorov complexity in natural models
M Charikar, E Lehman, D Liu, R Panigrahy, M Prabhakaran, A Rasala, ...
Proceedings of the thiry-fourth annual ACM symposium on Theory of computing …, 2002
752002
Construction of a non-malleable encryption scheme from any semantically secure one
R Pass, V Vaikuntanathan
Annual International Cryptology Conference, 271-289, 2006
682006
The system can't perform the operation now. Try again later.
Articles 1–20