Rafael Pass
Orcid: 0000-0001-7440-5690Affiliations:
- Cornell University, Ithaca, USA
- Massachusetts Institute of Technology, Cambridge, MA, USA (former)
According to our database1,
Rafael Pass
authored at least 226 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2022, "For contributions to the foundations of cryptography".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
Proceedings of the 16th Innovations in Theoretical Computer Science Conference, 2025
Hardness Along the Boundary: Towards One-Way Functions from the Worst-Case Hardness of Time-Bounded Kolmogorov Complexity.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
2024
Electron. Colloquium Comput. Complex., 2024
Electron. Colloquium Comput. Complex., 2024
CoRR, 2024
On the Viability of Open-Source Financial Rails: Economic Security of Permissionless Consensus.
CoRR, 2024
On One-Way Functions, the Worst-Case Hardness of Time-Bounded Kolmogorov Complexity, and Computational Depth.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
Proceedings of the 15th Innovations in Theoretical Computer Science Conference, 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Public-Coin, Complexity-Preserving, Succinct Arguments of Knowledge for NP from Collision-Resistance.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Proceedings of the 39th Computational Complexity Conference, 2024
Proceedings of the 39th Computational Complexity Conference, 2024
Proceedings of the Approximation, 2024
2023
IACR Cryptol. ePrint Arch., 2023
Electron. Colloquium Comput. Complex., 2023
Electron. Colloquium Comput. Complex., 2023
On One-way Functions and the Worst-case Hardness of Time-Bounded Kolmogorov Complexity.
Electron. Colloquium Comput. Complex., 2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Kolmogorov Comes to Cryptomania: On Interactive Kolmogorov Complexity and Key-Agreement.
Proceedings of the 64th IEEE Annual Symposium on Foundations of Computer Science, 2023
One-Way Functions and the Hardness of (Probabilistic) Time-Bounded Kolmogorov Complexity w.r.t. Samplable Distributions.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the 38th Computational Complexity Conference, 2023
2022
Electron. Colloquium Comput. Complex., 2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the 63rd IEEE Annual Symposium on Foundations of Computer Science, 2022
Proceedings of the 37th Computational Complexity Conference, 2022
Proceedings of the 37th Computational Complexity Conference, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2021
SIGACT News, 2021
Electron. Colloquium Comput. Complex., 2021
Electron. Colloquium Comput. Complex., 2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
Cryptography from sublinear-time average-case hardness of time-bounded Kolmogorov complexity.
Proceedings of the STOC '21: 53rd Annual ACM SIGACT Symposium on Theory of Computing, 2021
Proceedings of the STOC '21: 53rd Annual ACM SIGACT Symposium on Theory of Computing, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 3rd Symposium on Simplicity in Algorithms, 2020
Unprovability of Leakage-Resilient Cryptography Beyond the Information-Theoretic Limit.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Proceedings of the 61st IEEE Annual Symposium on Foundations of Computer Science, 2020
Proceedings of the 61st IEEE Annual Symposium on Foundations of Computer Science, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Which Languages Have 4-Round Fully Black-Box Zero-Knowledge Arguments from One-Way Functions?
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
A Round-Collapse Theorem for Computationally-Sound Protocols; or, TFNP is Hard (on Average) in Pessiland.
IACR Cryptol. ePrint Arch., 2019
A Conceptually Well-Founded Characterization of Iterated Admissibility Using an "All I Know" Operator.
Proceedings of the Proceedings Seventeenth Conference on Theoretical Aspects of Rationality and Knowledge, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the Algorithmic Game Theory - 12th International Symposium, 2019
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake.
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society, 2019
Proceedings of the Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, 2019
2018
SIAM J. Comput., 2018
Proceedings of the Theory of Cryptography - 16th International Conference, 2018
Proceedings of the Theory of Cryptography - 16th International Conference, 2018
Proceedings of the Theory of Cryptography - 16th International Conference, 2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Proceedings Sixteenth Conference on Theoretical Aspects of Rationality and Knowledge, 2017
Proceedings of the Web and Internet Economics - 13th International Conference, 2017
Proceedings of the 31st International Symposium on Distributed Computing, 2017
Proceedings of the Theory of Cryptography - 15th International Conference, 2017
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2017
Two-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles.
Proceedings of the 58th IEEE Annual Symposium on Foundations of Computer Science, 2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
Proceedings of the 2016 ACM Conference on Economics and Computation, 2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Proceedings of the Principles of Knowledge Representation and Reasoning: Proceedings of the Fifteenth International Conference, 2016
2015
IEEE Secur. Priv., 2015
IACR Cryptol. ePrint Arch., 2015
CoRR, 2015
CoRR, 2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, 2015
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
Not Just an Empty Threat: Subgame-Perfect Equilibrium in Repeated Games Played by Computationally Bounded Players.
Proceedings of the Web and Internet Economics - 10th International Conference, 2014
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the Algorithmic Game Theory - 7th International Symposium, 2014
Proceedings of the Principles of Knowledge Representation and Reasoning: Proceedings of the Fourteenth International Conference, 2014
Proceedings of the Innovations in Theoretical Computer Science, 2014
Proceedings of the 55th IEEE Annual Symposium on Foundations of Computer Science, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
SIGACT News, 2013
IACR Cryptol. ePrint Arch., 2013
On the (Im)Possibility of Tamper-Resilient Cryptography: Using Fourier Analysis in Computer Viruses.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the 14th Conference on Theoretical Aspects of Rationality and Knowledge (TARK 2013), 2013
Proceedings of the 14th Conference on Theoretical Aspects of Rationality and Knowledge (TARK 2013), 2013
Non-black-box simulation from one-way functions and applications to resettable security.
Proceedings of the Symposium on Theory of Computing Conference, 2013
Proceedings of the Innovations in Theoretical Computer Science, 2013
Proceedings of the Innovations in Theoretical Computer Science, 2013
Proceedings of the Innovations in Theoretical Computer Science, 2013
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013
2012
ACM Trans. Comput. Theory, 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
The Curious Case of Non-Interactive Commitments - On the Power of Black-Box vs. Non-Black-Box Use of Primitives.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012
2011
SIGecom Exch., 2011
CoRR, 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the 13th Conference on Theoretical Aspects of Rationality and Knowledge (TARK-2011), 2011
Proceedings of the 43rd ACM Symposium on Theory of Computing, 2011
Proceedings of the 43rd ACM Symposium on Theory of Computing, 2011
Proceedings of the Innovations in Computer Science, 2011
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011
2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions.
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Proceedings of the Advances in Cryptology, 2010
Game theory with costly computation: formulation and application to protocol security.
Proceedings of the Behavioral and Quantitative Game Theory, 2010
2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the 12th Conference on Theoretical Aspects of Rationality and Knowledge (TARK-2009), 2009
Proceedings of the 12th Conference on Theoretical Aspects of Rationality and Knowledge (TARK-2009), 2009
A unified framework for concurrent security: universal composability from stand-alone non-malleability.
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009
Proceedings of the IJCAI 2009, 2009
Proceedings of the Advances in Cryptology, 2009
2008
SIAM J. Comput., 2008
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007
Proceedings of the 39th Annual ACM Symposium on Theory of Computing, 2007
Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, 2007
Proceedings of the Advances in Cryptology, 2007
2006
Proceedings of the 38th Annual ACM Symposium on Theory of Computing, 2006
Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science, 2006
Proceedings of the Advances in Cryptology, 2006
Parallel Repetition of Zero-Knowledge Proofs and the Possibility of Basing Cryptography on NP-Hardness.
Proceedings of the 21st Annual IEEE Conference on Computational Complexity (CCC 2006), 2006
2005
Proceedings of the 37th Annual ACM Symposium on Theory of Computing, 2005
Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
2004
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
Proceedings of the 36th Annual ACM Symposium on Theory of Computing, 2004
Proceedings of the 45th Symposium on Foundations of Computer Science, 2004
2003
Proceedings of the 44th Symposium on Foundations of Computer Science, 2003
Proceedings of the Advances in Cryptology, 2003
Proceedings of the Advances in Cryptology, 2003