Follow
abhi shelat
abhi shelat
Professor of Computer Science
Verified email at neu.edu - Homepage
Title
Cited by
Cited by
Year
Analysis of the blockchain protocol in asynchronous networks
R Pass, L Seeman, A Shelat
Annual international conference on the theory and applications of …, 2017
8582017
The smallest grammar problem
M Charikar, E Lehman, D Liu, R Panigrahy, M Prabhakaran, A Sahai, ...
IEEE Transactions on Information Theory 51 (7), 2554-2576, 2005
4632005
One‐to‐many propensity score matching in cohort studies
JA Rassen, AA Shelat, J Myers, RJ Glynn, KJ Rothman, S Schneeweiss
Pharmacoepidemiology and drug safety 21, 69-80, 2012
4452012
Efficient protocols for set membership and range proofs
J Camenisch, R Chaabouni, A Shelat
International Conference on the Theory and Application of Cryptology and …, 2008
3932008
{Billion-Gate} secure computation with malicious adversaries
B Kreuter, A Shelat, CH Shen
21st USENIX Security Symposium (USENIX Security 12), 285-300, 2012
376*2012
Doubly-efficient zkSNARKs without trusted setup
RS Wahby, I Tzialla, A Shelat, J Thaler, M Walfish
2018 IEEE Symposium on Security and Privacy (SP), 926-943, 2018
3252018
Remembrance of data passed: A study of disk sanitization practices
SL Garfinkel, A Shelat
IEEE Security & Privacy 1 (1), 17-27, 2003
3132003
Simulatable adaptive oblivious transfer
J Camenisch, G Neven, abhi shelat
Advances in Cryptology-EUROCRYPT 2007, 573-590, 2007
3092007
Securely obfuscating re-encryption
S Hohenberger, GN Rothblum, abhi shelat, V Vaikuntanathan
Theory of Cryptography, 233-252, 2007
278*2007
Scaling ORAM for secure computation
J Doerner, A Shelat
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1982017
SCORAM: oblivious RAM for secure computation
XS Wang, Y Huang, THH Chan, A Shelat, E Shi
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1962014
Matching by propensity score in cohort studies with three treatment groups
JA Rassen, AA Shelat, JM Franklin, RJ Glynn, DH Solomon, ...
Epidemiology 24 (3), 401-409, 2013
1752013
A better method to analyze blockchain consistency
L Kiffer, R Rajaraman, A Shelat
Proceedings of the 2018 acm sigsac conference on computer and communications …, 2018
1702018
Secure two-party threshold ECDSA from ECDSA assumptions
J Doerner, Y Kondi, E Lee, A Shelat
2018 IEEE Symposium on Security and Privacy (SP), 980-997, 2018
1702018
Computing on authenticated data
JH Ahn, D Boneh, J Camenisch, S Hohenberger, A Shelat, B Waters
Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012 …, 2012
1572012
Threshold ECDSA from ECDSA assumptions: The multiparty case
J Doerner, Y Kondi, E Lee, A Shelat
2019 IEEE Symposium on Security and Privacy (SP), 1051-1066, 2019
1522019
Privacy and identity management for everyone
J Camenisch, A Shelat, D Sommer, S Fischer-Hübner, M Hansen, ...
Proceedings of the 2005 workshop on Digital identity management, 20-27, 2005
1392005
Two-output secure computation with malicious adversaries
C Shen, A Shelat
Advances in Cryptology–EUROCRYPT 2011, 386-405, 2011
135*2011
Approximation algorithms for grammar-based compression
E Lehman, A Shelat
Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete …, 2002
1142002
Micropayments for decentralized currencies
R Pass, A Shelat
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1102015
The system can't perform the operation now. Try again later.
Articles 1–20