Cryptographers' World
 

Adam Smith


Author's Web Page Link

20 papers in database with 1435 citations StarStar

H-number: 15

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Yevgeniy Dodis,  Jonathan Katz,  Adam Smith,  Shabsi Walfish,  Composability and On-Line Deniability of Authentication, pp. 146 - 162, TCC 2009.

[Electronic Edition][Cited 1 times ]

2. Shiva Prasad Kasiviswanathan,  Homin K. Lee,  Kobbi Nissim,  Sofya Raskhodnikova,  Adam Smith,  What Can We Learn Privately?, pp. 531 - 540, FOCS 2008.

[Electronic Edition][Cited 43 times ]

3. Ivan Damgard,  Yuval Ishai,  Mikkel Krøigaard,  Jesper Buus Nielsen,  Adam Smith,  Scalable Multiparty Computation with Nearly Optimal Work and Resilience, pp. 241 - 261, CRYPTO 2008.

[Electronic Edition][Cited 6 times ]

4. Vipul Goyal,  Payman Mohassel,  Adam Smith,  Efficient Two Party and Multi Party Computation Against Covert Adversaries, pp. 289 - 306, EUROCRYPT 2008.

[Electronic Edition][Cited 20 times ]

5. Kobbi Nissim,  Sofya Raskhodnikova,  Adam Smith,  Smooth sensitivity and sampling in private data analysis, pp. 75 - 84, STOC 2007.

[Electronic Edition][Cited 87 times Red Star]

6. Michael Ben-Or,  Claude CrĂ©peau,  Daniel Gottesman,  Avinatan Hassidim,  Adam Smith,  Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority, pp. 249 - 260, FOCS 2006.

[Electronic Edition][Cited 10 times ]

7. Cynthia Dwork,  Frank McSherry,  Kobbi Nissim,  Adam Smith,  Calibrating Noise to Sensitivity in Private Data Analysis, pp. 265 - 284, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 239 times Red StarRed Star]

8. Yevgeniy Dodis,  Jonathan Katz,  Leonid Reyzin,  Adam Smith,  Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets, pp. 232 - 250, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 48 times ]

9. Moni Naor,  Gil Segev,  Adam Smith,  Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models, pp. 214 - 231, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 20 times ]

10. Xavier Boyen,  Yevgeniy Dodis,  Jonathan Katz,  Rafail Ostrovsky,  Adam Smith,  Secure Remote Authentication Using Biometric Data, pp. 147 - 163, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 100 times Red StarRed Star]

11. Claude CrĂ©peau,  Daniel Gottesman,  Adam Smith,  Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes, pp. 285 - 301, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 18 times ]

12. Shuchi Chawla,  Cynthia Dwork,  Frank McSherry,  Adam Smith,  Hoeteck Wee,  Toward Privacy in Public Databases, pp. 363 - 385, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 143 times Red StarRed Star]

13. Yevgeniy Dodis,  Adam Smith,  Entropic Security and the Encryption of High Entropy Messages, pp. 556 - 577, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 27 times ]

14. Yevgeniy Dodis,  Leonid Reyzin,  Adam Smith,  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, pp. 523 - 540, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 405 times Red StarRed StarRed Star]

15. Cynthia Dwork,  Ronen Shaltiel,  Adam Smith,  Luca Trevisan,  List-Decoding of Linear Functions and Analysis of a Two-Round Zero-Knowledge Argument, pp. 101 - 120, TCC 2004.

[Electronic Edition][Cited 7 times ]

16. Jonathan Katz,  Rafail Ostrovsky,  Adam Smith,  Round Efficiency of Multi-party Computation with a Dishonest Majority, pp. 578 - 595, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 38 times ]

17. Howard Barnum,  Claude CrĂ©peau,  Daniel Gottesman,  Adam Smith,  Alain Tapp,  Authentication of Quantum Messages, pp. 449 - 458, FOCS 2002.

[Electronic Edition][Cited 95 times Red Star]

18. Moses Liskov,  Anna Lysyanskaya,  Silvio Micali,  Leonid Reyzin,  Adam Smith,  Mutually Independent Commitments, pp. 385 - 401, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 10 times ]

19. Yevgeniy Dodis,  Amit Sahai,  Adam Smith,  On Perfect and Adaptive Security in Exposure-Resilient Cryptography, pp. 301 - 324, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 50 times Red Star]

20. Giovanni Di Crescenzo,  Jonathan Katz,  Rafail Ostrovsky,  Adam Smith,  Efficient and Non-interactive Non-malleable Commitment, pp. 40 - 59, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 68 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...