Name
Affiliation
Papers
SHAFI GOLDWASSER
Laboratory of Computer Science, MIT and Department of Applied Mathematics and Computer Science, Weizmann Institute of Science, Rehovot, Israel
129
Collaborators
Citations 
PageRank 
132
9935
2069.05
Referers 
Referees 
References 
7661
1058
2051
Search Limit
1001000
Title
Citations
PageRank
Year
Interactive Proofs for Verifying Machine Learning.00.342021
Pseudo-Deterministic Streaming.00.342020
Beyond Perturbations: Learning Guarantees with Arbitrary Adversarial Test Examples00.342020
Homomorphic Encryption Standard.00.342019
Fine-grained Complexity Meets IP = PSPACE.10.352019
Doubly-Efficient Pseudo-Deterministic Proofs00.342019
Population stability: regulating size in the presence of an adversary.00.342018
Pseudo-deterministic Proofs.00.342017
Bipartite Perfect Matching in Pseudo-Deterministic NC.20.382017
Public Accountability vs. Secret Laws: Can They Coexist?: A Cryptographic Proposal.10.362017
The Complexity of Problems in P Given Correlated Instances.00.342017
On the Fine Grained Complexity of Polynomial Time Problems Given Correlated Instances.00.342016
How To Incentivize Data-Driven Collaboration Among Competing Parties20.372016
Perfect Bipartite Matching in Pseudo-Deterministic $RNC$.30.412015
On Time and Order in Multiparty Computation.20.382015
Adaptively Secure Coin-Flipping, Revisited.20.392015
Aggregate Pseudorandom Functions and Connections to Learning.20.432015
Multi-Input Functional Encryption.381.022014
The Hunting of the SNARK.20.382014
Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation.180.562014
The impossibility of obfuscation with a universal simulator.10.362014
Overcoming the Worst-Case Curse for Cryptographic Constructions.10.362013
How to Run Turing Machines on Encrypted Data.621.822013
Communication locality in secure multi-party computation: how to run sublinear algorithms in a distributed setting230.722013
A Note on the Impossibility of Obfuscation with Auxiliary Input.30.402013
Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond.151.092012
How to Compute in the Presence of Leakage381.102012
Distributed public key schemes secure against continual leakage100.502012
Multiparty computation secure against continual memory leakage290.892012
Pseudo-deterministic Algorithms (Invited Talk).00.342012
Collision-Free Hashing from Lattice Problems.545.932011
Program obfuscation with leaky hardware200.772011
Probabilistic Search Algorithms with Unique Answers and Their Cryptographic Applications.70.612011
Leakage-resilient coin tossing70.462011
Erratum for: on basing one-way functions on NP-hardness10.422010
Robustness of the Learning with Errors Assumption572.112010
Public-key encryption schemes with auxiliary inputs1022.902010
Black-box circular-secure encryption beyond affine functions311.242009
Cryptography without (Hardly Any) Secrets ?20.522009
Simultaneous Hardcore Bits and Cryptography against Memory Attacks2457.412009
Athena lecture: Controlling Access to Programs?00.342009
Delegating computation: interactive proofs for muggles1324.222008
How to Protect Yourself without Perfect Shredding80.902008
A (de)constructive approach to program checking120.602008
On basing one-way functions on NP-hardness331.182006
Fault-Tolerant Distributed Computing in Full-Information Networks100.542006
Proof of plaintext knowledge for the ajtai-dwork cryptosystem71.722005
On the Impossibility of Obfuscation with Auxiliary Input1176.402005
Secure Multi-Party Computation without Agreement451.752005
Distributed computing with imperfect randomness60.442005
  • 1
  • 2