Abhi Shelat
Affiliations:- Northeastern University, Khoury College of Computer Sciences, Boston, MA, USA
- University of Virginia, Charlottesville, VA, USA
According to our database1,
Abhi Shelat
authored at least 83 papers
between 2002 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
J. Cryptol., March, 2025
2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
2023
J. Cryptol., April, 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
2022
Improved Straight-Line Extraction in the Random Oracle Model With Applications to Signature Aggregation.
IACR Cryptol. ePrint Arch., 2022
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
2018
IACR Cryptol. ePrint Arch., 2018
2017
Proceedings of the Web and Internet Economics - 13th International Conference, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 25th USENIX Security Symposium, 2016
2015
IEEE Secur. Priv., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 2015 Data Compression Conference, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
2013
Black-box construction of a more than non-malleable CCA1 encryption scheme from plaintext awareness.
J. Comput. Secur., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Black-Box Proof of Knowledge of Plaintext and Multiparty Computation with Low Communication Overhead.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the 2013 Data Compression Conference, 2013
Proceedings of the PETShop'13, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Innovations in Computer Science, 2011
Proceedings of the Information Systems Security - 7th International Conference, 2011
2010
Proceedings of the Behavioral and Quantitative Game Theory, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, 2009
Proceedings of the Advances in Cryptology, 2009
2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, 2007
Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), 2007
Proceedings of the Advances in Cryptology, 2007
2006
Proceedings of the 2006 Workshop on Digital Identity Management, 2006
Proceedings of the Advances in Cryptology, 2006
2005
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
Proceedings of the 37th Annual ACM Symposium on Theory of Computing, 2005
Proceedings of the 2005 Workshop on Digital Identity Management, 2005
Proceedings of the Advances in Cryptology, 2005
2004
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004
Proceedings of the Nineteenth National Conference on Artificial Intelligence, 2004
2003
IEEE Secur. Priv., 2003
IEEE Security & Privacy: Data Forensics - Rememberance of Data Passed: A Study of Disk Sanitization Practices.
IEEE Distributed Syst. Online, 2003
Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2003
2002
Proceedings of the Proceedings on 34th Annual ACM Symposium on Theory of Computing, 2002
Proceedings of the Thirteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2002