What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Salil P. Vadhan
Google Scholar
39
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
Analyzing the Differentially Private Theil-Sen Estimator for Simple Linear Regression.
Jayshree Sarathy
Salil P. Vadhan
2024
conf/ccs
A Framework for Differential Privacy Against Timing Attacks.
Zachary Ratliff
Salil P. Vadhan
2023
conf/ccs
Concurrent Composition for Interactive Differential Privacy with Adaptive Privacy-Loss Parameters.
Samuel Haney
Michael Shoemate
Grace Tian
Salil P. Vadhan
Andrew Vyrros
Vicki Xu
Wanrong Zhang
2022
journals/popets
Differentially Private Simple Linear Regression.
Daniel Alabi
Audra McMillan
Jayshree Sarathy
Adam D. Smith
Salil P. Vadhan
2022
conf/ccs
Widespread Underestimation of Sensitivity in Differentially Private Libraries and How to Fix It.
Sílvia Casacuberta
Michael Shoemate
Salil P. Vadhan
Connor Wagaman
2021
conf/tcc
Concurrent Composition of Differential Privacy.
Salil P. Vadhan
Tianhao Wang
2020
journals/joc
PCPs and the Hardness of Generating Synthetic Data.
Jonathan R. Ullman
Salil P. Vadhan
2019
conf/crypto
Unifying Computational Entropies via Kullback-Leibler Divergence.
Rohit Agrawal
Yi-Hsiu Chen
Thibaut Horel
Salil P. Vadhan
2018
journals/joc
Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions.
Ananth Raghunathan
Gil Segev
Salil P. Vadhan
2016
conf/tcc
Separating Computational and Statistical Differential Privacy in the Client-Server Model.
Mark Bun
Yi-Hsiu Chen
Salil P. Vadhan
2016
conf/tcc
The Complexity of Computing the Optimal Composition of Differential Privacy.
Jack Murtagh
Salil P. Vadhan
2013
conf/crypto
A Uniform Min-Max Theorem with Applications in Cryptography.
Salil P. Vadhan
Colin Jia Zheng
2013
conf/eurocrypt
Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions.
Ananth Raghunathan
Gil Segev
Salil P. Vadhan
2012
conf/crypto
Differential Privacy with Imperfect Randomness.
Yevgeniy Dodis
Adriana López-Alt
Ilya Mironov
Salil P. Vadhan
2012
conf/tcc
Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources.
Yevgeniy Dodis
Thomas Ristenpart
Salil P. Vadhan
2011
conf/crypto
Time-Lock Puzzles in the Random Oracle Model.
Mohammad Mahmoody
Tal Moran
Salil P. Vadhan
2011
conf/tcc
PCPs and the Hardness of Generating Private Synthetic Data.
Jonathan R. Ullman
Salil P. Vadhan
2010
conf/crypto
Improved Delegation of Computation Using Fully Homomorphic Encryption.
Kai-Min Chung
Yael Tauman Kalai
Salil P. Vadhan
2010
conf/eurocrypt
Universal One-Way Hash Functions via Inaccessible Entropy.
Iftach Haitner
Thomas Holenstein
Omer Reingold
Salil P. Vadhan
Hoeteck Wee
2010
conf/tcc
Composition of Zero-Knowledge Proofs with Efficient Provers.
Eleanor Birrell
Salil P. Vadhan
2009
conf/crypto
Computational Differential Privacy.
Ilya Mironov
Omkant Pandey
Omer Reingold
Salil P. Vadhan
2009
conf/tcc
Fairness with an Honest Minority and a Rational Majority.
Shien Jin Ong
David C. Parkes
Alon Rosen
Salil P. Vadhan
2009
conf/tcc
Proofs of Retrievability via Hardness Amplification.
Yevgeniy Dodis
Salil P. Vadhan
Daniel Wichs
2008
journals/joc
Simpler Session-Key Generation from Short Random Passwords.
Minh-Huyen Nguyen
Salil P. Vadhan
2008
conf/tcc
An Equivalence Between Zero Knowledge and Commitments.
Shien Jin Ong
Salil P. Vadhan
2008
conf/tcc
Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model.
André Chailloux
Dragos Florin Ciocan
Iordanis Kerenidis
Salil P. Vadhan
2007
conf/crypto
Amplifying Collision Resistance: A Complexity-Theoretic Treatment.
Ran Canetti
Ronald L. Rivest
Madhu Sudan
Luca Trevisan
Salil P. Vadhan
Hoeteck Wee
2007
conf/eurocrypt
Zero Knowledge and Soundness Are Symmetric.
Shien Jin Ong
Salil P. Vadhan
2006
conf/crypto
Random Selection with an Adversarial Majority.
Ronen Gradwohl
Salil P. Vadhan
David Zuckerman
2006
conf/tcc
Concurrent Zero Knowledge Without Complexity Assumptions.
Daniele Micciancio
Shien Jin Ong
Amit Sahai
Salil P. Vadhan
2004
journals/joc
Constructing Locally Computable Extractors and Cryptosystems in the Bounded-Storage Model.
Salil P. Vadhan
2004
conf/tcc
Notions of Reducibility between Cryptographic Primitives.
Omer Reingold
Luca Trevisan
Salil P. Vadhan
2004
conf/tcc
Simpler Session-Key Generation from Short Random Passwords.
Minh-Huyen Nguyen
Salil P. Vadhan
2003
conf/crypto
Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice Problems and More.
Daniele Micciancio
Salil P. Vadhan
2003
conf/crypto
On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model.
Salil P. Vadhan
2003
conf/crypto
Derandomization in Cryptography.
Boaz Barak
Shien Jin Ong
Salil P. Vadhan
2001
conf/crypto
On the (Im)possibility of Obfuscating Programs.
Boaz Barak
Oded Goldreich
Russell Impagliazzo
Steven Rudich
Amit Sahai
Salil P. Vadhan
Ke Yang
1999
conf/crypto
Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZK.
Oded Goldreich
Amit Sahai
Salil P. Vadhan
1998
conf/crypto
Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems.
Mihir Bellare
Shai Halevi
Amit Sahai
Salil P. Vadhan
Coauthors
Adam D. Smith
(1)
Adriana López-Alt
(1)
Alon Rosen
(1)
Amit Sahai
(4)
Ananth Raghunathan
(2)
André Chailloux
(1)
Andrew Vyrros
(1)
Audra McMillan
(1)
Boaz Barak
(2)
Colin Jia Zheng
(1)
Connor Wagaman
(1)
Daniel Alabi
(1)
Daniel Wichs
(1)
Daniele Micciancio
(2)
David C. Parkes
(1)
David Zuckerman
(1)
Dragos Florin Ciocan
(1)
Eleanor Birrell
(1)
Gil Segev
(2)
Grace Tian
(1)
Hoeteck Wee
(2)
Iftach Haitner
(1)
Ilya Mironov
(2)
Iordanis Kerenidis
(1)
Jack Murtagh
(1)
Jayshree Sarathy
(2)
Jonathan R. Ullman
(2)
Kai-Min Chung
(1)
Ke Yang
(1)
Luca Trevisan
(2)
Madhu Sudan
(1)
Mark Bun
(1)
Michael Shoemate
(2)
Mihir Bellare
(1)
Minh-Huyen Nguyen
(2)
Mohammad Mahmoody
(1)
Oded Goldreich
(2)
Omer Reingold
(3)
Omkant Pandey
(1)
Ran Canetti
(1)
Rohit Agrawal
(1)
Ronald L. Rivest
(1)
Ronen Gradwohl
(1)
Russell Impagliazzo
(1)
Salil P. Vadhan
(39)
Samuel Haney
(1)
Shai Halevi
(1)
Shien Jin Ong
(5)
Sílvia Casacuberta
(1)
Steven Rudich
(1)
Tal Moran
(1)
Thibaut Horel
(1)
Thomas Holenstein
(1)
Thomas Ristenpart
(1)
Tianhao Wang
(1)
Vicki Xu
(1)
Wanrong Zhang
(1)
Yael Tauman Kalai
(1)
Yevgeniy Dodis
(3)
Yi-Hsiu Chen
(2)
Zachary Ratliff
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to