| Publication | Date of Publication | Type |
|---|
| Pseudorandom Generators for Read-Once Monotone Branching Programs | 2023-11-20 | Paper |
| Canonical noise distributions and private hypothesis tests | 2023-07-19 | Paper |
| Pseudodistributions that beat all pseudorandom generators (extended abstract) | 2023-07-12 | Paper |
| Concurrent composition of differential privacy | 2023-04-13 | Paper |
| Limitations of the Impagliazzo-Nisan-Wigderson pseudorandom generator against permutation branching programs | 2023-03-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5875498 | 2023-02-03 | Paper |
| Derandomization beyond Connectivity: Undirected Laplacian Systems in Nearly Logarithmic Space | 2022-08-17 | Paper |
| Concurrent Composition Theorems for Differential Privacy | 2022-07-17 | Paper |
| When Simple Hash Functions Suffice | 2022-02-04 | Paper |
| The Many Entropies in One-Way Functions | 2022-01-12 | Paper |
| The Complexity of Differential Privacy | 2022-01-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5158498 | 2021-10-25 | Paper |
| Differential Privacy on Finite Computers | 2021-06-15 | Paper |
| Finite Sample Differentially Private Confidence Intervals | 2021-06-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5140842 | 2020-12-17 | Paper |
| PCPs and the hardness of generating synthetic data | 2020-11-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5121911 | 2020-09-22 | Paper |
| Unifying computational entropies via Kullback-Leibler divergence | 2020-03-09 | Paper |
| Fingerprinting Codes and the Price of Approximate Differential Privacy | 2018-11-07 | Paper |
| Deterministic public-key encryption for adaptively-chosen plaintext distributions | 2018-11-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4568112 | 2018-06-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4591372 | 2017-11-14 | Paper |
| A Lower Bound on List Size for List Decoding | 2017-07-27 | Paper |
| Locally testable codes and cayley graphs | 2017-05-19 | Paper |
| Redrawing the boundaries on purchasing data from privacy-sensitive individuals | 2017-05-19 | Paper |
| Publicly verifiable proofs of sequential work | 2017-05-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2969669 | 2017-03-22 | Paper |
| Separating Computational and Statistical Differential Privacy in the Client-Server Model | 2016-12-21 | Paper |
| Extracting all the randomness and reducing the error in Trevisan's extractors | 2016-09-29 | Paper |
| Pseudorandom generators without the XOR Lemma (extended abstract) | 2016-09-29 | Paper |
| The Complexity of Computing the Optimal Composition of Differential Privacy | 2016-03-23 | Paper |
| A complete problem for statistical zero knowledge | 2015-12-07 | Paper |
| Unbalanced expanders and randomness extractors from Parvaresh--Vardy codes | 2015-11-11 | Paper |
| The Computational Complexity of Nash Equilibria in Concisely Represented Games | 2015-09-24 | Paper |
| Fingerprinting codes and the price of approximate differential privacy | 2015-06-26 | Paper |
| On the complexity of differentially private data release | 2015-02-04 | Paper |
| Inaccessible entropy | 2015-02-04 | Paper |
| Privacy Games | 2015-01-07 | Paper |
| Deterministic extractors for small-space sources | 2014-11-25 | Paper |
| Zero knowledge with efficient provers | 2014-11-25 | Paper |
| Pseudorandom walks on regular digraphs and the RL vs. L problem | 2014-11-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3191600 | 2014-10-06 | Paper |
| On transformation of interactive proofs that preserve the prover's complexity | 2014-09-26 | Paper |
| S-T connectivity on digraphs with a known stationary distribution | 2014-09-09 | Paper |
| Efficiency improvements in constructing pseudorandom generators from one-way functions | 2014-08-13 | Paper |
| Interactive proofs of proximity | 2014-08-07 | Paper |
| Characterizing pseudoentropy and simplifying pseudorandom generator constructions | 2014-05-13 | Paper |
| On the (im)possibility of obfuscating programs | 2014-02-17 | Paper |
| Pseudorandomness | 2014-01-03 | Paper |
| A study of statistical zero-knowledge proofs (to appear) | 2013-12-05 | Paper |
| Pseudorandomness for Regular Branching Programs via Fourier Analysis | 2013-10-04 | Paper |
| Efficiency Improvements in Constructing Pseudorandom Generators from One-Way Functions | 2013-09-25 | Paper |
| A Uniform Min-Max Theorem with Applications in Cryptography | 2013-09-02 | Paper |
| Faster Algorithms for Privately Releasing Marginals | 2013-08-12 | Paper |
| Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions | 2013-05-31 | Paper |
| On extractors and exposure‐resilient functions for sublogarithmic entropy | 2013-05-28 | Paper |
| Differential Privacy with Imperfect Randomness | 2012-09-25 | Paper |
| Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources | 2012-06-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3096715 | 2011-11-11 | Paper |
| Simplified Derandomization of BPP Using a Hitting Set Generator | 2011-08-19 | Paper |
| On the Complexity of Computational Problems Regarding Distributions | 2011-08-19 | Paper |
| Time-Lock Puzzles in the Random Oracle Model | 2011-08-12 | Paper |
| PCPs and the Hardness of Generating Private Synthetic Data | 2011-05-19 | Paper |
| Are PCPs inherent in efficient arguments? | 2011-02-18 | Paper |
| Deterministic extractors for small-space sources | 2011-01-18 | Paper |
| Improved Delegation of Computation Using Fully Homomorphic Encryption | 2010-08-24 | Paper |
| Extractors | 2010-08-16 | Paper |
| Randomness-efficient low degree tests and short PCPs via epsilon-biased sets | 2010-08-16 | Paper |
| The round complexity of two-party random selection | 2010-08-16 | Paper |
| Robust pcps of proximity, shorter pcps and applications to coding | 2010-08-15 | Paper |
| Using nondeterminism to amplify hardness | 2010-08-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3579408 | 2010-08-06 | Paper |
| Randomness conductors and constant-degree lossless expanders | 2010-08-05 | Paper |
| Statistically Hiding Commitments and Statistical Zero-Knowledge Arguments from Any One-Way Function | 2010-07-07 | Paper |
| Universal One-Way Hash Functions via Inaccessible Entropy | 2010-06-01 | Paper |
| Composition of Zero-Knowledge Proofs with Efficient Provers | 2010-02-24 | Paper |
| The hardness of the expected decision depth problem | 2010-01-29 | Paper |
| Pseudorandom Bit Generators That Fool Modular Sums | 2009-10-28 | Paper |
| Computational Differential Privacy | 2009-10-20 | Paper |
| Theory of Cryptography | 2009-05-14 | Paper |
| Theory of Cryptography | 2009-05-14 | Paper |
| The Round Complexity of Two-Party Random Selection | 2009-04-30 | Paper |
| Amplifying Collision Resistance: A Complexity-Theoretic Treatment | 2009-03-10 | Paper |
| Fairness with an Honest Minority and a Rational Majority | 2009-03-03 | Paper |
| Proofs of Retrievability via Hardness Amplification | 2009-03-03 | Paper |
| The Complexity of Distinguishing Markov Random Fields | 2008-11-27 | Paper |
| Tight Bounds for Hashing Block Sources | 2008-11-27 | Paper |
| Limitations of Hardness vs. Randomness under Uniform Reductions | 2008-11-27 | Paper |
| New Proofs of the Green-Tao-Ziegler Dense Model Theorem: An Exposition | 2008-06-02 | Paper |
| The Complexity of Zero Knowledge | 2008-04-24 | Paper |
| Derandomization in Cryptography | 2008-04-22 | Paper |
| Simpler session-key generation from short random passwords | 2008-04-16 | Paper |
| Pseudorandomness and average-case complexity via uniform reductions | 2008-03-11 | Paper |
| An Equivalence Between Zero Knowledge and Commitments | 2008-03-05 | Paper |
| Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model | 2008-03-05 | Paper |
| Zero Knowledge and Soundness Are Symmetric | 2007-11-29 | Paper |
| Advances in Cryptology - CRYPTO 2003 | 2007-11-28 | Paper |
| Advances in Cryptology - CRYPTO 2003 | 2007-11-28 | Paper |
| Advances in Cryptology - CRYPTO 2003 | 2007-11-28 | Paper |
| Robust PCPs of Proximity, Shorter PCPs, and Applications to Coding | 2007-09-07 | Paper |
| An Unconditional Study of Computational Zero Knowledge | 2007-09-07 | Paper |
| Random Selection with an Adversarial Majority | 2007-09-04 | Paper |
| Theory of Cryptography | 2007-02-12 | Paper |
| Approximation, Randomization and Combinatorial Optimization. Algorithms and Techniques | 2006-07-07 | Paper |
| Approximation, Randomization and Combinatorial Optimization. Algorithms and Techniques | 2006-07-07 | Paper |
| Using Nondeterminism to Amplify Hardness | 2006-06-01 | Paper |
| Lower bounds for non-black-box zero knowledge | 2006-04-28 | Paper |
| Compression of samplable sources | 2006-02-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4650574 | 2005-02-18 | Paper |
| Constructing locally computable extractors and cryptosystems in the bounded-storage model | 2004-09-22 | Paper |
| On interactive proofs with a laconic prover | 2003-11-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4414270 | 2003-07-24 | Paper |
| Extracting all the randomness and reducing the error in Trevisan's extractors | 2003-05-04 | Paper |
| Pseudorandom generators without the XOR lemma | 2003-02-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4783716 | 2002-12-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4780779 | 2002-11-21 | Paper |
| Entropy waves, the zig-zag graph product, and new constant-degree expanders | 2002-10-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4542558 | 2002-09-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4542562 | 2002-08-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4535028 | 2002-06-12 | Paper |
| The Complexity of Counting in Sparse, Regular, and Planar Graphs | 2002-04-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4941874 | 2000-08-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4249337 | 1999-06-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4224935 | 1999-01-17 | Paper |