Yael Tauman Kalai
Orcid: 0009-0002-9406-7734Affiliations:
- Massachusetts Institute of Technology, USA
- Microsoft Research New England, Cambridge, USA
According to our database1,
Yael Tauman Kalai
authored at least 120 papers
between 2001 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on acm.org
-
on orcid.org
-
on id.loc.gov
On csauthors.net:
Bibliography
2025
Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 2025
Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 2025
Proceedings of the 16th Innovations in Theoretical Computer Science Conference, 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
2024
Proceedings of the 56th Annual ACM Symposium on Theory of Computing, 2024
2023
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023
Proceedings of the 2023 ACM-SIAM Symposium on Discrete Algorithms, 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
2022
IEEE Trans. Inf. Theory, 2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Interactive error correcting codes over binary erasure channels resilient to > ½ adversarial corruption.
Proceedings of the STOC '22: 54th Annual ACM SIGACT Symposium on Theory of Computing, Rome, Italy, June 20, 2022
Proceedings of the STOC '22: 54th Annual ACM SIGACT Symposium on Theory of Computing, Rome, Italy, June 20, 2022
Proceedings of the 63rd IEEE Annual Symposium on Foundations of Computer Science, 2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
2021
Efficient Multiparty Interactive Coding - Part I: Oblivious Insertions, Deletions and Substitutions.
IEEE Trans. Inf. Theory, 2021
IACR Cryptol. ePrint Arch., 2021
Interactive Error Correcting Codes Over Binary Erasure Channels Resilient to $>\frac12$ Adversarial Corruption.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
Proceedings of the STOC '21: 53rd Annual ACM SIGACT Symposium on Theory of Computing, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, 2020
Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Proceedings of the Information Theory and Applications Workshop, 2020
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020
Proceedings of the 61st IEEE Annual Symposium on Foundations of Computer Science, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Theory of Cryptography - 17th International Conference, 2019
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, 2019
Efficient Multiparty Interactive Coding for Insertions, Deletions, and Substitutions.
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, 2019
2018
Special Section on the Forty-Seventh Annual ACM Symposium on Theory of Computing (STOC 2015).
SIAM J. Comput., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Electron. Colloquium Comput. Complex., 2018
Proceedings of the 32nd International Symposium on Distributed Computing, 2018
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, 2018
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, 2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
2017
Non-interactive delegation and batch NP verification from standard computational assumptions.
Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, 2017
Proceedings of the 8th Innovations in Theoretical Computer Science Conference, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
Electron. Colloquium Comput. Complex., 2016
Proceedings of the Theory of Cryptography - 14th International Conference, 2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
Proceedings of the Theory of Cryptography - 14th International Conference, 2016
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016
2015
Proceedings of the Distributed Computing - 29th International Symposium, 2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015
Proceedings of the Automata, Languages, and Programming - 42nd International Colloquium, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
2014
Electron. Colloquium Comput. Complex., 2014
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Proceedings of the Symposium on Theory of Computing, 2014
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Symposium on Theory of Computing Conference, 2013
Proceedings of the Symposium on Theory of Computing Conference, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
2012
Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the 44th Symposium on Theory of Computing Conference, 2012
Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, 2012
Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, 2012
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
2011
Proceedings of the Distributed Computing - 25th International Symposium, 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Innovations in Computer Science, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the Innovations in Computer Science, 2010
Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage.
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010
Proceedings of the Advances in Cryptology, 2010
2009
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009
2-Source Extractors under Computational Assumptions and Cryptography with Defective Randomness.
Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, 2009
Proceedings of the Advances in Cryptology, 2009
2008
Proceedings of the 40th Annual ACM Symposium on Theory of Computing, 2008
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008
Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science, 2008
2007
IACR Cryptol. ePrint Arch., 2007
2006
Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science, 2006
Proceedings of the Theoretical Computer Science, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the 37th Annual ACM Symposium on Theory of Computing, 2005
Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science, 2005
Proceedings of the Advances in Cryptology, 2005
2003
Proceedings of the 44th Symposium on Foundations of Computer Science, 2003
2001
Proceedings of the Advances in Cryptology, 2001