Dana Dachman-Soled

Orcid: 0000-0001-6797-641X

Affiliations:
  • University of Maryland, College Park, MD, USA


According to our database1, Dana Dachman-Soled authored at least 86 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Balancing Fairness and Accuracy in Data-Restricted Binary Classification.
CoRR, 2024

Bounding the Excess Risk for Linear Models Trained on Marginal-Preserving, Differentially-Private, Synthetic Data.
CoRR, 2024

2023
On the Privacy of Sublinear-Communication Jaccard Index Estimation via Min-hash Sketching.
IACR Cryptol. ePrint Arch., 2023

Extracting Randomness from Samplable Distributions, Revisited.
Electron. Colloquium Comput. Complex., 2023

(Inefficient Prover) ZAPs from Hard-to-Invert Functions.
Electron. Colloquium Comput. Complex., 2023

A Canonical Data Transformation for Achieving Inter- and Within-group Fairness.
CoRR, 2023

Revisiting Security Estimation for LWE with Hints from a Geometric Perspective.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer.
IACR Cryptol. ePrint Arch., 2022

Breaking RSA Generically is Equivalent to Factoring, with Preprocessing.
IACR Cryptol. ePrint Arch., 2022

Refined Security Estimation for LWE with Hints via a Geometric Approach.
IACR Cryptol. ePrint Arch., 2022

Secure Sampling with Sublinear Communication.
IACR Cryptol. ePrint Arch., 2022

(Nondeterministic) Hardness vs. Non-Malleability.
Electron. Colloquium Comput. Complex., 2022

2021
Towards a Ring Analogue of the Leftover Hash Lemma.
J. Math. Cryptol., 2021

(In)Security of Ring-LWE Under Partial Key Exposure.
J. Math. Cryptol., 2021

BKW Meets Fourier: New Algorithms for LPN with Sparse Parities.
IACR Cryptol. ePrint Arch., 2021

Compressed Oblivious Encoding for Homomorphically Encrypted Search.
IACR Cryptol. ePrint Arch., 2021

Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack on SQLite.
Proceedings of the 30th USENIX Security Symposium, 2021

Non-malleable Codes for Bounded Parallel-Time Tampering.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Differentially-Private Multi-Party Sketching for Large-Scale Statistics.
Proc. Priv. Enhancing Technol., 2020

Locally Decodable and Updatable Non-malleable Codes and Their Applications.
J. Cryptol., 2020

Feasibility and Infeasibility of Secure Computation with Malicious PUFs.
J. Cryptol., 2020

Non-Malleable Codes for Bounded Polynomial Depth Tampering.
IACR Cryptol. ePrint Arch., 2020

LWE with Side Information: Attacks and Concrete Security Estimation.
IACR Cryptol. ePrint Arch., 2020

Revisiting Fairness in MPC: Polynomial Number of Parties and General Adversarial Structures.
IACR Cryptol. ePrint Arch., 2020

Transparency Tools for Fairness in AI (Luskin).
CoRR, 2020

How to 0wn the NAS in Your Spare Time.
Proceedings of the 8th International Conference on Learning Representations, 2020

New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions, Interaction, and Trust.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness.
J. Cryptol., 2019

Leakage Resilience from Program Obfuscation.
J. Cryptol., 2019

TMPS: Ticket-Mediated Password Strengthening.
IACR Cryptol. ePrint Arch., 2019

Limits to Non-Malleability.
IACR Cryptol. ePrint Arch., 2019

New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions and Interaction.
IACR Cryptol. ePrint Arch., 2019

Constant-Round Group Key Exchange from the Ring-LWE Assumption.
IACR Cryptol. ePrint Arch., 2019

Mitigating Reverse Engineering Attacks on Deep Neural Networks.
Proceedings of the 2019 IEEE Computer Society Annual Symposium on VLSI, 2019

2018
A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption.
J. Cryptol., 2018

Upper and Lower Bounds for Continuous Non-Malleable Codes.
IACR Cryptol. ePrint Arch., 2018

Partial Key Exposure in Ring-LWE-Based Cryptosystems: Attacks and Resilience.
IACR Cryptol. ePrint Arch., 2018

Non-Malleable Codes Against Bounded Polynomial Time Tampering.
IACR Cryptol. ePrint Arch., 2018

Non-Malleable Codes for Small-Depth Circuits.
Electron. Colloquium Comput. Complex., 2018

Improved, black-box, non-malleable encryption from semantic security.
Des. Codes Cryptogr., 2018

Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks.
CoRR, 2018

Local Non-malleable Codes in the Bounded Retrieval Model.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Non-malleable Codes from Average-Case Hardness: $${\mathsf {A}}{\mathsf {C}}^0$$ , Decision Trees, and Streaming Space-Bounded Tampering.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

2017
Locally Decodable and Updatable Non-Malleable Codes in the Bounded Retrieval Model.
IACR Cryptol. ePrint Arch., 2017

Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-Malleable Codes.
IACR Cryptol. ePrint Arch., 2017

On the Leakage Resilience of Ideal-Lattice Based Public Key Encryption.
IACR Cryptol. ePrint Arch., 2017

Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees, and Streaming Space-Bounded Tampering.
IACR Cryptol. ePrint Arch., 2017

2016
Towards a Characterization of the Related-Key Attack Security of the Iterated Even-Mansour Cipher.
IACR Cryptol. ePrint Arch., 2016

Leakage-Resilient Public-Key Encryption from Obfuscation.
IACR Cryptol. ePrint Arch., 2016

Towards Non-Black-Box Separations of Public Key Encryption and One Way Function.
IACR Cryptol. ePrint Arch., 2016

Non-Malleable Codes for Bounded Depth, Bounded Fan-in Circuits.
IACR Cryptol. ePrint Arch., 2016

Efficient Concurrent Covert Computation of String Equality and Set Intersection.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

2015
Oblivious Network RAM.
IACR Cryptol. ePrint Arch., 2015

10-Round Feistel is Indifferentiable from an Ideal Cipher.
IACR Cryptol. ePrint Arch., 2015

Adaptively Secure, Universally Composable, Multiparty Computation in Constant Rounds.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Approximate resilience, monotonicity, and the complexity of agnostic learning.
Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, 2015

2014
Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components without Leak-free Hardware.
IACR Cryptol. ePrint Arch., 2014

Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds.
IACR Cryptol. ePrint Arch., 2014

Can Optimally-Fair Coin Tossing Be Based on One-Way Functions?
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Securing Circuits and Protocols against 1/poly(k) Tampering Rate.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

On Minimal Assumptions for Sender-Deniable Public Key Encryption.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Leakage-Tolerant Computation with Input-Independent Preprocessing.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware Encryption Scheme.
IACR Cryptol. ePrint Arch., 2013

Why "Fiat-Shamir for Proofs" Lacks a Proof.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Efficient robust private set intersection.
Int. J. Appl. Cryptogr., 2012

Securing Circuits Against Constant-Rate Tampering.
IACR Cryptol. ePrint Arch., 2012

Enhanced Chosen-Ciphertext Security and Applications.
IACR Cryptol. ePrint Arch., 2012

On the Impossibility of Sender-Deniable Public Key Encryption.
IACR Cryptol. ePrint Arch., 2012

On the (In)security of the Fiat-Shamir Paradigm, Revisited.
IACR Cryptol. ePrint Arch., 2012

On the Centrality of Off-Line E-Cash to Concrete Partial Information Games.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Efficient Password Authenticated Key Exchange via Oblivious Transfer.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

2011
On Black-Box Complexity and Adaptive, Universal Composability of Cryptographic Tasks.
PhD thesis, 2011

Adaptive and Concurrent Secure Computation from New Notions of Non-Malleability.
IACR Cryptol. ePrint Arch., 2011

Computational Extractors and Pseudorandomness.
IACR Cryptol. ePrint Arch., 2011

On the Black-Box Complexity of Optimally-Fair Coin Tossing.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

A Canonical Form for Testing Boolean Function Properties.
Proceedings of the Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, 2011

Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications.
Proceedings of the Applied Cryptography and Network Security, 2011

2009
Distribution-Free Testing Lower Bound for Basic Boolean Functions.
Theory Comput., 2009

Optimal Cryptographic Hardness of Learning Monotone Functions.
Theory Comput., 2009

Simple, Black-Box Constructions of Adaptively Secure Protocols.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

Improved Non-committing Encryption with Applications to Adaptively Secure Protocols.
Proceedings of the Advances in Cryptology, 2009

2008
Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

2007
Distribution-Free Testing Lower Bounds for Basic Boolean Functions.
Proceedings of the Approximation, 2007

Configuration Reasoning and Ontology ForWeb.
Proceedings of the 2007 IEEE International Conference on Services Computing (SCC 2007), 2007


  Loading...