Cryptographers' World
 

Cynthia Dwork


Author's Web Page Link

20 papers in database with 1591 citations StarStarStar

Editor of 2 conference proceedings books

H-number: 14

Conference Proceedings

 
1. Richard E. LadnerCynthia Dwork, editors, Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17-20, 2008. Association for Computing Machinery, 2008. ISBN 978-1-60558-047-0.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Cynthia Dwork, editor, Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings. Springer, 2006. ISBN 3-540-37432-9.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Cynthia Dwork,  Moni Naor,  An Efficient Existentially Unforgeable Signature Scheme and Its Applications, Journal of Cryptology, Volume 11(3), pp. 187 - 208, Springer, 1998.

[Cited 86 times Red Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Cynthia Dwork,  Moni Naor,  Guy N. Rothblum,  Vinod Vaikuntanathan,  How Efficient Can Memory Checking Be?, pp. 503 - 520, TCC 2009.

[Electronic Edition][Cited 14 times ]

2. Cynthia Dwork,  The Differential Privacy Frontier (Extended Abstract), pp. 496 - 502, TCC 2009.

[Electronic Edition][Cited 23 times ]

3. Cynthia Dwork,  Sergey Yekhanin,  New Efficient Attacks on Statistical Disclosure Control Mechanisms, pp. 469 - 480, CRYPTO 2008.

[Electronic Edition][Cited 19 times ]

4. Cynthia Dwork,  Krishnaram Kenthapadi,  Frank McSherry,  Ilya Mironov,  Moni Naor,  Our Data, Ourselves: Privacy Via Distributed Noise Generation, pp. 486 - 503, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 73 times Red Star]

5. Cynthia Dwork,  Frank McSherry,  Kobbi Nissim,  Adam Smith,  Calibrating Noise to Sensitivity in Private Data Analysis, pp. 265 - 284, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 239 times Red StarRed Star]

6. Cynthia Dwork,  Moni Naor,  Hoeteck Wee,  Pebbling and Proofs of Work, pp. 37 - 54, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 9 times ]

7. Shuchi Chawla,  Cynthia Dwork,  Frank McSherry,  Adam Smith,  Hoeteck Wee,  Toward Privacy in Public Databases, pp. 363 - 385, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 143 times Red StarRed Star]

8. Cynthia Dwork,  Sub-linear Queries Statistical Databases: Privacy with Power, pp. 1 - 6, CT-RSA 2005.

[Electronic Edition][No citation]

9. Cynthia Dwork,  Kobbi Nissim,  Privacy-Preserving Datamining on Vertically Partitioned Databases, pp. 528 - 544, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 130 times Red StarRed Star]

10. Cynthia Dwork,  Moni Naor,  Omer Reingold,  Immunizing Encryption Schemes from Decryption Errors, pp. 342 - 360, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 20 times ]

11. Cynthia Dwork,  Ronen Shaltiel,  Adam Smith,  Luca Trevisan,  List-Decoding of Linear Functions and Analysis of a Two-Round Zero-Knowledge Argument, pp. 101 - 120, TCC 2004.

[Electronic Edition][Cited 7 times ]

12. Cynthia Dwork,  Andrew Goldberg,  Moni Naor,  On Memory-Bound Functions for Fighting Spam, pp. 426 - 444, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 149 times Red StarRed Star]

13. Cynthia Dwork,  Amit Sahai,  Concurrent Zero-Knowledge: Reducing the Need for Timing Constraints, pp. 442 - 457, CRYPTO 1998.

[Electronic Edition][Cited 76 times Red Star]

14. Ran Canetti,  Cynthia Dwork,  Moni Naor,  Rafail Ostrovsky,  Deniable Encryption, pp. 90 - 104, CRYPTO 1997.

[Electronic Edition][Cited 141 times Red StarRed Star]

15. Cynthia Dwork,  Moni Naor,  An Efficient Existentially Unforgeable Signature Scheme and its Applications, pp. 234 - 246, CRYPTO 1994.

[Electronic Edition][Cited 100 times Red StarRed Star]

16. Cynthia Dwork,  Uriel Feige,  Joe Kilian,  Moni Naor,  Shmuel Safra,  Low Communication 2-Prover Zero-Knowledge Proofs for NP, pp. 215 - 227, CRYPTO 1992.

[Electronic Edition][Cited 19 times ]

17. Cynthia Dwork,  Moni Naor,  Pricing via Processing or Combatting Junk Mail, pp. 139 - 147, CRYPTO 1992.

[Electronic Edition][Cited 417 times Red StarRed StarRed Star]

18. Cynthia Dwork,  On Verification in Secret Sharing, pp. 114 - 128, CRYPTO 1991.

[Electronic Edition][Cited 5 times ]

19. Cynthia Dwork,  Larry J. Stockmeyer,  Zero-Knowledge With Finite State Verifiers, pp. 71 - 75, CRYPTO 1988.

[Electronic Edition][Cited 7 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...