Dana Dachman-Soled
Orcid: 0000-0001-6797-641XAffiliations:
- University of Maryland, College Park, MD, USA
According to our database1,
Dana Dachman-Soled
authored at least 90 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Forensics Secur., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Quantum Black-Box Separations: Succinct Non-Interactive Arguments from Falsifiable Assumptions.
IACR Cryptol. ePrint Arch., 2024
Bounding the Excess Risk for Linear Models Trained on Marginal-Preserving, Differentially-Private, Synthetic Data.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the 5th Conference on Information-Theoretic Cryptography, 2024
2023
On the Privacy of Sublinear-Communication Jaccard Index Estimation via Min-hash Sketching.
IACR Cryptol. ePrint Arch., 2023
Electron. Colloquium Comput. Complex., 2023
Electron. Colloquium Comput. Complex., 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Electron. Colloquium Comput. Complex., 2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
2020
Proc. Priv. Enhancing Technol., 2020
J. Cryptol., 2020
J. Cryptol., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Revisiting Fairness in MPC: Polynomial Number of Parties and General Adversarial Structures.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 8th International Conference on Learning Representations, 2020
New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions, Interaction, and Trust.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
2019
J. Cryptol., 2019
New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions and Interaction.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 2019 IEEE Computer Society Annual Symposium on VLSI, 2019
2018
A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption.
J. Cryptol., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Electron. Colloquium Comput. Complex., 2018
Des. Codes Cryptogr., 2018
Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks.
CoRR, 2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Non-malleable Codes from Average-Case Hardness: $${\mathsf {A}}{\mathsf {C}}^0$$ , Decision Trees, and Streaming Space-Bounded Tampering.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-Malleable Codes.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees, and Streaming Space-Bounded Tampering.
IACR Cryptol. ePrint Arch., 2017
2016
Towards a Characterization of the Related-Key Attack Security of the Iterated Even-Mansour Cipher.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Adaptively Secure, Universally Composable, Multiparty Computation in Constant Rounds.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, 2015
2014
Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components without Leak-free Hardware.
IACR Cryptol. ePrint Arch., 2014
Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
2013
A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware Encryption Scheme.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
2011
On Black-Box Complexity and Adaptive, Universal Composability of Cryptographic Tasks.
PhD thesis, 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2009
Theory Comput., 2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the Advances in Cryptology, 2009
2008
Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
2007
Proceedings of the Approximation, 2007
Proceedings of the 2007 IEEE International Conference on Services Computing (SCC 2007), 2007