default search action
Elaine Shi
Person information
- affiliation: Carnegie Mellon University, USA
- affiliation (former): Cornell University, Ithaca, NY, USA
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Wei Dong, Zijun Chen, Qiyao Luo, Elaine Shi, Ke Yi:
Continual Observation of Joins under Differential Privacy. Proc. ACM Manag. Data 2(3): 128 (2024) - [j21]Yue Guo, Antigoni Polychroniadou, Elaine Shi, David Byrd, Tucker Balch:
MicroSecAgg: Streamlined Single-Server Secure Aggregation. Proc. Priv. Enhancing Technol. 2024(3): 246-275 (2024) - [j20]Pengzhi Huang, Thang Hoang, Yueying Li, Elaine Shi, G. Edward Suh:
Efficient Privacy-Preserving Machine Learning with Lightweight Trusted Hardware. Proc. Priv. Enhancing Technol. 2024(4): 327-348 (2024) - [c159]Mingxun Zhou, Giulia Fanti, Elaine Shi:
Conan: Distributed Proofs of Compliance for Anonymous Data Collection. CCS 2024: 914-928 - [c158]Wei Dong, Qiyao Luo, Giulia Fanti, Elaine Shi, Ke Yi:
Almost Instance-optimal Clipping for Summation Problems in the Shuffle Model of Differential Privacy. CCS 2024: 1939-1953 - [c157]Yuval Ishai, Elaine Shi, Daniel Wichs:
PIR with Client-Side Preprocessing: Information-Theoretic Constructions and Lower Bounds. CRYPTO (9) 2024: 148-182 - [c156]Ashrujit Ghoshal, Mingxun Zhou, Elaine Shi:
Efficient Pre-processing PIR Without Public-Key Cryptography. EUROCRYPT (6) 2024: 210-240 - [c155]Ke Wu, Elaine Shi, Hao Chung:
Maximizing Miner Revenue in Transaction Fee Mechanism Design. ITCS 2024: 98:1-98:23 - [c154]Mingxun Zhou, Mengshi Zhao, T.-H. Hubert Chan, Elaine Shi:
Advanced Composition Theorems for Differential Obliviousness. ITCS 2024: 103:1-103:24 - [c153]Mingxun Zhou, Andrew Park, Wenting Zheng, Elaine Shi:
Piano: Extremely Simple, Single-Server PIR with Sublinear Server Computation. SP 2024: 4296-4314 - [c152]Alireza Farhadi, Sixue Cliff Liu, Elaine Shi:
Connected Components in Linear Work and Near-Optimal Time. SPAA 2024: 395-402 - [i141]Hao Chung, Tim Roughgarden, Elaine Shi:
Collusion-Resilience in Transaction Fee Mechanism Design. CoRR abs/2402.09321 (2024) - [i140]T.-H. Hubert Chan, Ke Wu, Elaine Shi:
Mechanism Design for Automated Market Makers. CoRR abs/2402.09357 (2024) - [i139]Wei Dong, Qiyao Luo, Giulia Fanti, Elaine Shi, Ke Yi:
Instance-optimal Clipping for Summation Problems in the Shuffle Model of Differential Privacy. CoRR abs/2403.10116 (2024) - [i138]Jacob D. Leshno, Elaine Shi, Rafael Pass:
On the Viability of Open-Source Financial Rails: Economic Security of Permissionless Consensus. CoRR abs/2409.08951 (2024) - [i137]Hao Chung, Tim Roughgarden, Elaine Shi:
Collusion-Resilience in Transaction Fee Mechanism Design. IACR Cryptol. ePrint Arch. 2024: 237 (2024) - [i136]Ashrujit Ghoshal, Baitian Li, Yaohua Ma, Chenxin Dai, Elaine Shi:
Information-Theoretic Multi-Server PIR with Global Preprocessing. IACR Cryptol. ePrint Arch. 2024: 765 (2024) - [i135]Yuval Ishai, Elaine Shi, Daniel Wichs:
PIR with Client-Side Preprocessing: Information-Theoretic Constructions and Lower Bounds. IACR Cryptol. ePrint Arch. 2024: 976 (2024) - [i134]Mingxun Zhou, Elaine Shi, Giulia Fanti:
Pacmann: Efficient Private Approximate Nearest Neighbor Search. IACR Cryptol. ePrint Arch. 2024: 1600 (2024) - 2023
- [j19]Ittai Abraham, T.-H. Hubert Chan, Danny Dolev, Kartik Nayak, Rafael Pass, Ling Ren, Elaine Shi:
Communication complexity of byzantine agreement, revisited. Distributed Comput. 36(1): 3-28 (2023) - [j18]Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Kartik Nayak, Enoch Peserico, Elaine Shi:
OptORAMa: Optimal Oblivious RAM. J. ACM 70(1): 4:1-4:70 (2023) - [j17]Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Elaine Shi:
Oblivious RAM with Worst-Case Logarithmic Overhead. J. Cryptol. 36(2): 7 (2023) - [j16]Sarabjeet Singh, Xiong Fan, Ananth Krishna Prasad, Lin Jia, Anirban Nag, Rajeev Balasubramonian, Mahdi Nazm Bojnordi, Elaine Shi:
XCRYPT: Accelerating Lattice-Based Cryptography With Memristor Crossbar Arrays. IEEE Micro 43(5): 45-54 (2023) - [j15]Joshua Gancher, Kristina Sojakova, Xiong Fan, Elaine Shi, Greg Morrisett:
A Core Calculus for Equational Proofs of Cryptographic Protocols. Proc. ACM Program. Lang. 7(POPL): 866-892 (2023) - [c151]Mingxun Zhou, Elaine Shi, T.-H. Hubert Chan, Shir Maimon:
A Theory of Composition for Differential Obliviousness. EUROCRYPT (3) 2023: 3-34 - [c150]Mingxun Zhou, Wei-Kai Lin, Yiannis Tselekounis, Elaine Shi:
Optimal Single-Server Private Information Retrieval. EUROCRYPT (1) 2023: 395-425 - [c149]Andrew Park, Wei-Kai Lin, Elaine Shi:
NanoGRAM: Garbled RAM with $\widetilde{O}(\log N)$ Overhead. EUROCRYPT (1) 2023: 456-486 - [c148]Elaine Shi, Hao Chung, Ke Wu:
What Can Cryptography Do for Decentralized Mechanism Design? ITCS 2023: 97:1-97:22 - [c147]Tung Le, Pengzhi Huang, Attila A. Yavuz, Elaine Shi, Thang Hoang:
Efficient Dynamic Proof of Retrievability for Cold Storage. NDSS 2023 - [c146]Elaine Shi, Nikhil Vanjani:
Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles. Public Key Cryptography (1) 2023: 622-651 - [c145]Jun Wan, Atsuki Momose, Ling Ren, Elaine Shi, Zhuolun Xiang:
On the Amortized Communication Complexity of Byzantine Broadcast. PODC 2023: 253-261 - [c144]Hao Chung, Elaine Shi:
Foundations of Transaction Fee Mechanism Design. SODA 2023: 3856-3899 - [c143]Rex Fernando, Elaine Shi, Pratik Soni, Nikhil Vanjani, Brent Waters:
Non-Interactive Anonymous Router with Quasi-Linear Router Computation. TCC (3) 2023: 62-92 - [c142]Sourav Das, Rex Fernando, Ilan Komargodski, Elaine Shi, Pratik Soni:
Distributed-Prover Interactive Proofs. TCC (1) 2023: 91-120 - [c141]Afonso Tinoco, Sixiang Gao, Elaine Shi:
EnigMap: External-Memory Oblivious Map for Secure Enclaves. USENIX Security Symposium 2023: 4033-4050 - [i133]Sarabjeet Singh, Xiong Fan, Ananth Krishna Prasad, Lin Jia, Anirban Nag, Rajeev Balasubramonian, Mahdi Nazm Bojnordi, Elaine Shi:
XCRYPT: Accelerating Lattice Based Cryptography with Memristor Crossbar Arrays. CoRR abs/2302.00095 (2023) - [i132]Ke Wu, Elaine Shi, Hao Chung:
Maximizing Miner Revenue in Transaction Fee Mechanism Design. CoRR abs/2302.12895 (2023) - [i131]Alireza Farhadi, S. Cliff Liu, Elaine Shi:
Connected Components in Linear Work and Near-Optimal Time. CoRR abs/2312.02332 (2023) - [i130]Atsuki Momose, Ling Ren, Elaine Shi, Jun Wan, Zhuolun Xiang:
On the Amortized Communication Complexity of Byzantine Broadcast. IACR Cryptol. ePrint Arch. 2023: 38 (2023) - [i129]Ke Wu, Elaine Shi, Hao Chung:
Maximizing Miner Revenue in Transaction Fee Mechanism Design. IACR Cryptol. ePrint Arch. 2023: 283 (2023) - [i128]Mingxun Zhou, Andrew Park, Elaine Shi, Wenting Zheng:
Piano: Extremely Simple, Single-Server PIR with Sublinear Server Computation. IACR Cryptol. ePrint Arch. 2023: 452 (2023) - [i127]Elaine Shi, Nikhil Vanjani:
Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles. IACR Cryptol. ePrint Arch. 2023: 615 (2023) - [i126]Mingxun Zhou, Mengshi Zhao, T.-H. Hubert Chan, Elaine Shi:
Advanced Composition Theorems for Differential Obliviousness. IACR Cryptol. ePrint Arch. 2023: 842 (2023) - [i125]Tianyao Gu, Yilei Wang, Bingnan Chen, Afonso Tinoco, Elaine Shi, Ke Yi:
Efficient Oblivious Sorting and Shuffling for Hardware Enclaves. IACR Cryptol. ePrint Arch. 2023: 1258 (2023) - [i124]Jacob D. Leshno, Rafael Pass, Elaine Shi:
Can open decentralized ledgers be economically secure? IACR Cryptol. ePrint Arch. 2023: 1516 (2023) - [i123]Ashrujit Ghoshal, Mingxun Zhou, Elaine Shi:
Efficient Pre-processing PIR Without Public-Key Cryptography. IACR Cryptol. ePrint Arch. 2023: 1574 (2023) - [i122]Mingxun Zhou, Elaine Shi, Giulia Fanti:
Proof of Compliance for Anonymous, Unlinkable Messages. IACR Cryptol. ePrint Arch. 2023: 1900 (2023) - 2022
- [j14]T.-H. Hubert Chan, Kai-Min Chung, Bruce M. Maggs, Elaine Shi:
Foundations of Differentially Oblivious Algorithms. J. ACM 69(4): 27:1-27:49 (2022) - [j13]Gilad Asharov, T.-H. Hubert Chan, Kartik Nayak, Rafael Pass, Ling Ren, Elaine Shi:
Locality-Preserving Oblivious RAM. J. Cryptol. 35(2): 6 (2022) - [j12]Lianke Qin, Rajesh Jayaram, Elaine Shi, Zhao Song, Danyang Zhuo, Shumo Chu:
Differentially Oblivious Relational Database Operators. Proc. VLDB Endow. 16(4): 842-855 (2022) - [j11]Gilad Asharov, Wei-Kai Lin, Elaine Shi:
Sorting Short Keys in Circuits of Size ${o(n \log n)}$. SIAM J. Comput. 51(3): 424-466 (2022) - [c140]Alireza Farhadi, MohammadTaghi Hajiaghayi, Elaine Shi:
Differentially Private Densest Subgraph. AISTATS 2022: 11581-11597 - [c139]Ilan Komargodski, Shin'ichiro Matsuo, Elaine Shi, Ke Wu:
log *-Round Game-Theoretically-Fair Leader Election. CRYPTO (3) 2022: 409-438 - [c138]Rex Fernando, Yuval Gelles, Ilan Komargodski, Elaine Shi:
Maliciously Secure Massively Parallel Computation for All-but-One Corruptions. CRYPTO (1) 2022: 688-718 - [c137]Ke Wu, Gilad Asharov, Elaine Shi:
A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss. EUROCRYPT (1) 2022: 120-149 - [c136]Naama Ben-David, Benjamin Y. Chan, Elaine Shi:
Revisiting the Power of Non-Equivocation in Distributed Protocols. PODC 2022: 450-459 - [c135]Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, Elaine Shi:
Optimal Oblivious Parallel RAM. SODA 2022: 2459-2521 - [c134]Wei-Kai Lin, Elaine Shi:
Optimal Sorting Circuits for Short Keys. SODA 2022: 3583-3629 - [c133]Mingxun Zhou, Tianhao Wang, T.-H. Hubert Chan, Giulia Fanti, Elaine Shi:
Locally Differentially Private Sparse Vector Aggregation. SP 2022: 422-439 - [c132]Jiaheng Zhang, Tiancheng Xie, Thang Hoang, Elaine Shi, Yupeng Zhang:
Polynomial Commitment with a One-to-Many Prover and Applications. USENIX Security Symposium 2022: 2965-2982 - [e6]Heng Yin, Angelos Stavrou, Cas Cremers, Elaine Shi:
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022. ACM 2022, ISBN 978-1-4503-9450-5 [contents] - [i121]Elaine Shi, Hao Chung, Ke Wu:
What Can Cryptography Do For Decentralized Mechanism Design. CoRR abs/2209.14462 (2022) - [i120]Pengzhi Huang, Thang Hoang, Yueying Li, Elaine Shi, G. Edward Suh:
STAMP: Lightweight TEE-Assisted MPC for Efficient Privacy-Preserving Machine Learning. CoRR abs/2210.10133 (2022) - [i119]Lianke Qin, Rajesh Jayaram, Elaine Shi, Zhao Song, Danyang Zhuo, Shumo Chu:
Adore: Differentially Oblivious Relational Database Operators. CoRR abs/2212.05176 (2022) - [i118]Mingxun Zhou, Elaine Shi:
The Power of the Differentially Oblivious Shuffle in Distributed Privacy Mechanisms. IACR Cryptol. ePrint Arch. 2022: 177 (2022) - [i117]Andrew Park, Wei-Kai Lin, Elaine Shi:
NanoGRAM: Garbled RAM with $\widetilde{O}(\log N)$ Overhead. IACR Cryptol. ePrint Arch. 2022: 191 (2022) - [i116]Hao Chung, Elisaweta Masserova, Elaine Shi, Sri Aravinda Krishnan Thyagarajan:
Ponyta: Foundations of Side-Contract-Resilient Fair Exchange. IACR Cryptol. ePrint Arch. 2022: 582 (2022) - [i115]Mingxun Zhou, Wei-Kai Lin, Yiannis Tselekounis, Elaine Shi:
Optimal Single-Server Private Information Retrieval. IACR Cryptol. ePrint Arch. 2022: 609 (2022) - [i114]Yue Guo, Antigoni Polychroniadou, Elaine Shi, David Byrd, Tucker Balch:
MicroFedML: Privacy Preserving Federated Learning for Small Weights. IACR Cryptol. ePrint Arch. 2022: 714 (2022) - [i113]Ilan Komargodski, Shin'ichiro Matsuo, Elaine Shi, Ke Wu:
log*-Round Game-Theoretically-Fair Leader Election. IACR Cryptol. ePrint Arch. 2022: 791 (2022) - [i112]Ilan Komargodski, Elaine Shi:
Differentially Oblivious Turing Machines. IACR Cryptol. ePrint Arch. 2022: 883 (2022) - [i111]Rex Fernando, Yuval Gelles, Ilan Komargodski, Elaine Shi:
Maliciously Secure Massively Parallel Computation for All-but-One Corruptions. IACR Cryptol. ePrint Arch. 2022: 1027 (2022) - [i110]Hao Chung, Elisaweta Masserova, Elaine Shi, Sri Aravinda Krishnan Thyagarajan:
Rapidash: Improved Constructions for Side-Contract-Resilient Fair Exchange. IACR Cryptol. ePrint Arch. 2022: 1063 (2022) - [i109]Afonso Tinoco, Sixiang Gao, Elaine Shi:
EnigMap: Signal Should Use Oblivious Algorithms for Private Contact Discovery. IACR Cryptol. ePrint Arch. 2022: 1083 (2022) - [i108]Elaine Shi, Hao Chung, Ke Wu:
What Can Cryptography Do For Decentralized Mechanism Design? IACR Cryptol. ePrint Arch. 2022: 1294 (2022) - [i107]Mingxun Zhou, Elaine Shi, T.-H. Hubert Chan, Shir Maimon:
A Theory of Composition for Differential Obliviousness. IACR Cryptol. ePrint Arch. 2022: 1357 (2022) - [i106]Rex Fernando, Elaine Shi, Pratik Soni, Nikhil Vanjani:
Non-Interactive Anonymous Router with Quasi-Linear Router Computation. IACR Cryptol. ePrint Arch. 2022: 1395 (2022) - [i105]Tung Le, Pengzhi Huang, Attila A. Yavuz, Elaine Shi, Thang Hoang:
Efficient Dynamic Proof of Retrievability for Cold Storage. IACR Cryptol. ePrint Arch. 2022: 1417 (2022) - 2021
- [c131]Elaine Shi:
Streamlet: An Absurdly Simple, Textbook Blockchain Protocol. AsiaCCS 2021: 320 - [c130]T.-H. Hubert Chan, Elaine Shi, Wei-Kai Lin, Kartik Nayak:
Perfectly Oblivious (Parallel) RAM Revisited, and Improved Constructions. ITC 2021: 8:1-8:23 - [c129]Shumo Chu, Danyang Zhuo, Elaine Shi, T.-H. Hubert Chan:
Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms. ITC 2021: 19:1-19:24 - [c128]Kai-Min Chung, T.-H. Hubert Chan, Ting Wen, Elaine Shi:
Game-Theoretic Fairness Meets Multi-party Protocols: The Case of Leader Election. CRYPTO (2) 2021: 3-32 - [c127]Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Elaine Shi:
Oblivious RAM with Worst-Case Logarithmic Overhead. CRYPTO (4) 2021: 610-640 - [c126]Elaine Shi, Waqar Aqeel, Balakrishnan Chandrasekaran, Bruce M. Maggs:
Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwidth and Time. CRYPTO (4) 2021: 641-669 - [c125]Elaine Shi, Ke Wu:
Non-Interactive Anonymous Router. EUROCRYPT (3) 2021: 489-520 - [c124]Yoko Shibuya, Go Yamamoto, Fuhito Kojima, Elaine Shi, Shin'ichiro Matsuo, Aron Laszka:
Selfish Mining Attacks Exacerbated by Elastic Hash Supply. Financial Cryptography (2) 2021: 269-276 - [c123]Ilan Komargodski, Elaine Shi:
Differentially Oblivious Turing Machines. ITCS 2021: 68:1-68:19 - [c122]Cosku Acay, Rolph Recto, Joshua Gancher, Andrew C. Myers, Elaine Shi:
Viaduct: an extensible, optimizing compiler for secure distributed programs. PLDI 2021: 740-755 - [c121]Gilad Asharov, Wei-Kai Lin, Elaine Shi:
Sorting Short Keys in Circuits of Size o(n log n). SODA 2021: 2249-2268 - [c120]Vijaya Ramachandran, Elaine Shi:
Data Oblivious Algorithms for Multicores. SPAA 2021: 373-384 - [e5]Yongdae Kim, Jong Kim, Giovanni Vigna, Elaine Shi:
CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021. ACM 2021, ISBN 978-1-4503-8454-4 [contents] - [i104]Wei-Kai Lin, Elaine Shi:
Optimal Sorting Circuits for Short Keys. CoRR abs/2102.11489 (2021) - [i103]Yoko Shibuya, Go Yamamoto, Fuhito Kojima, Elaine Shi, Shin'ichiro Matsuo, Aron Laszka:
Selfish Mining Attacks Exacerbated by Elastic Hash Supply. CoRR abs/2103.08007 (2021) - [i102]Alireza Farhadi, MohammadTaghi Hajiaghayi, Elaine Shi:
Differentially Private Densest Subgraph. CoRR abs/2106.00508 (2021) - [i101]Hao Chung, Elaine Shi:
Foundations of Transaction Fee Mechanism Design. CoRR abs/2111.03151 (2021) - [i100]Mingxun Zhou, Tianhao Wang, T.-H. Hubert Chan, Giulia Fanti, Elaine Shi:
Locally Differentially Private Sparse Vector Aggregation. CoRR abs/2112.03449 (2021) - [i99]Greg Morrisett, Elaine Shi, Kristina Sojakova, Xiong Fan, Joshua Gancher:
IPDL: A Simple Framework for Formally Verifying Distributed Cryptographic Protocols. IACR Cryptol. ePrint Arch. 2021: 147 (2021) - [i98]Elaine Shi, Ke Wu:
Non-Interactive Anonymous Router. IACR Cryptol. ePrint Arch. 2021: 435 (2021) - [i97]Cosku Acay, Rolph Recto, Joshua Gancher, Andrew C. Myers, Elaine Shi:
Viaduct: An Extensible, Optimizing Compiler for Secure Distributed Programs (Technical Report). IACR Cryptol. ePrint Arch. 2021: 468 (2021) - [i96]Shumo Chu, Danyang Zhuo, Elaine Shi, T.-H. Hubert Chan:
Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms. IACR Cryptol. ePrint Arch. 2021: 593 (2021) - [i95]Ke Wu, Gilad Asharov, Elaine Shi:
A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss. IACR Cryptol. ePrint Arch. 2021: 748 (2021) - [i94]Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Elaine Shi:
Oblivious RAM with Worst-Case Logarithmic Overhead. IACR Cryptol. ePrint Arch. 2021: 1123 (2021) - [i93]Benedikt Bünz, Yuncong Hu, Shin'ichiro Matsuo, Elaine Shi:
Non-Interactive Differentially Anonymous Router. IACR Cryptol. ePrint Arch. 2021: 1242 (2021) - [i92]Hao Chung, Elaine Shi:
Foundations of Transaction Fee Mechanism Design. IACR Cryptol. ePrint Arch. 2021: 1474 (2021) - 2020
- [j10]Alireza Farhadi, Mohammad Taghi Hajiaghayi, Kasper Green Larsen, Elaine Shi:
Lower bounds for external memory integer sorting via network coding. Commun. ACM 63(10): 97-105 (2020) - [j9]Dana Dachman-Soled, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:
Locally Decodable and Updatable Non-malleable Codes and Their Applications. J. Cryptol. 33(1): 319-355 (2020) - [j8]Emil Stefanov, Marten van Dijk, Elaine Shi, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas:
A Retrospective on Path ORAM. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(8): 1572-1576 (2020) - [c119]Benjamin Y. Chan, Elaine Shi:
Streamlet: Textbook Streamlined Blockchains. AFT 2020: 1-11 - [c118]Andrew Morgan, Rafael Pass, Elaine Shi:
On the Adaptive Security of MACs and PRFs. ASIACRYPT (1) 2020: 724-753 - [c117]Pan Zhang, Chengyu Song, Heng Yin, Deqing Zou, Elaine Shi, Hai Jin:
Klotski: Efficient Obfuscated Execution against Controlled-Channel Attacks. ASPLOS 2020: 1263-1276 - [c116]Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Kartik Nayak, Enoch Peserico, Elaine Shi:
OptORAMa: Optimal Oblivious RAM. EUROCRYPT (2) 2020: 403-432 - [c115]Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, Elaine Shi:
Oblivious Parallel Tight Compaction. ITC 2020: 11:1-11:23 - [c114]T.-H. Hubert Chan, Kai-Min Chung, Wei-Kai Lin, Elaine Shi:
MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture. ITCS 2020: 75:1-75:52 - [c113]T.-H. Hubert Chan, Rafael Pass, Elaine Shi:
Sublinear-Round Byzantine Agreement Under Corrupt Majority. Public Key Cryptography (2) 2020: 246-265 - [c112]Gilad Asharov, T.-H. Hubert Chan, Kartik Nayak, Rafael Pass, Ling Ren, Elaine Shi:
Bucket Oblivious Sort: An Extremely Simple Oblivious Sort. SOSA 2020: 8-14 - [c111]T.-H. Hubert Chan, Zhibin Liang, Antigoni Polychroniadou, Elaine Shi:
Small Memory Robust Simulation of Client-Server Interactive Protocols over Oblivious Noisy Channels. SODA 2020: 2349-2365 - [c110]Elaine Shi:
Path Oblivious Heap: Optimal and Practical Oblivious Priority Queue. SP 2020: 842-858 - [c109]Rex Fernando, Ilan Komargodski, Yanyi Liu, Elaine Shi:
Secure Massively Parallel Computation for Dishonest Majority. TCC (2) 2020: 379-409 - [c108]Jun Wan, Hanshen Xiao, Elaine Shi, Srinivas Devadas:
Expected Constant Round Byzantine Broadcast Under Dishonest Majority. TCC (1) 2020: 381-411 - [c107]Jun Wan, Hanshen Xiao, Srinivas Devadas, Elaine Shi:
Round-Efficient Byzantine Broadcast Under Strongly Adaptive and Majority Corruptions. TCC (1) 2020: 412-456 - [c106]Kartik Nayak, Ling Ren, Elaine Shi, Nitin H. Vaidya, Zhuolun Xiang:
Improved Extension Protocols for Byzantine Broadcast and Agreement. DISC 2020: 28:1-28:17 - [i91]Kartik Nayak, Ling Ren, Elaine Shi, Nitin H. Vaidya, Zhuolun Xiang:
Improved Extension Protocols for Byzantine Broadcast and Agreement. CoRR abs/2002.11321 (2020) - [i90]Vijaya Ramachandran, Elaine Shi:
Data Oblivious Algorithms for Multicores. CoRR abs/2008.00332 (2020) - [i89]Gilad Asharov, T.-H. Hubert Chan, Kartik Nayak, Rafael Pass, Ling Ren, Elaine Shi:
Bucket Oblivious Sort: An Extremely Simple Oblivious Sort. CoRR abs/2008.01765 (2020) - [i88]Gilad Asharov, Wei-Kai Lin, Elaine Shi:
Sorting Short Keys in Circuits of Size o(n log n). CoRR abs/2010.09884 (2020) - [i87]Elaine Shi:
Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey). IACR Cryptol. ePrint Arch. 2020: 87 (2020) - [i86]Benjamin Y. Chan, Elaine Shi:
Streamlet: Textbook Streamlined Blockchains. IACR Cryptol. ePrint Arch. 2020: 88 (2020) - [i85]Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, Elaine Shi:
Oblivious Parallel Tight Compaction. IACR Cryptol. ePrint Arch. 2020: 125 (2020) - [i84]T.-H. Hubert Chan, Kai-Min Chung, Wei-Kai Lin, Elaine Shi:
MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture. IACR Cryptol. ePrint Arch. 2020: 240 (2020) - [i83]Jun Wan, Hanshen Xiao, Elaine Shi, Srinivas Devadas:
Expected Constant Round Byzantine Broadcast under Dishonest Majority. IACR Cryptol. ePrint Arch. 2020: 590 (2020) - [i82]T.-H. Hubert Chan, Wei-Kai Lin, Kartik Nayak, Elaine Shi:
Perfectly Secure Oblivious Parallel RAM with O(log3 N/ log log N) Overhead. IACR Cryptol. ePrint Arch. 2020: 604 (2020) - [i81]T.-H. Hubert Chan, Naomi Ephraim, Antonio Marcedone, Andrew Morgan, Rafael Pass, Elaine Shi:
Blockchain with Varying Number of Players. IACR Cryptol. ePrint Arch. 2020: 677 (2020) - [i80]Vijaya Ramachandran, Elaine Shi:
Data Oblivious Algorithms for Multicores. IACR Cryptol. ePrint Arch. 2020: 947 (2020) - [i79]Andrew Morgan, Rafael Pass, Elaine Shi:
On the Adaptive Security of MACs and PRFs. IACR Cryptol. ePrint Arch. 2020: 1090 (2020) - [i78]Rex Fernando, Ilan Komargodski, Yanyi Liu, Elaine Shi:
Secure Massively Parallel Computation for Dishonest Majority. IACR Cryptol. ePrint Arch. 2020: 1157 (2020) - [i77]Jun Wan, Hanshen Xiao, Srinivas Devadas, Elaine Shi:
Round-Efficient Byzantine Broadcast under Strongly Adaptive and Majority Corruptions. IACR Cryptol. ePrint Arch. 2020: 1236 (2020) - [i76]Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, Elaine Shi:
Optimal Oblivious Parallel RAM. IACR Cryptol. ePrint Arch. 2020: 1292 (2020) - [i75]Kai-Min Chung, T.-H. Hubert Chan, Ting Wen, Elaine Shi:
Game-Theoretically Fair Leader Election in O(log log n) Rounds under Majority Coalitions. IACR Cryptol. ePrint Arch. 2020: 1591 (2020) - [i74]Elaine Shi, Waqar Aqeel, Balakrishnan Chandrasekaran, Bruce M. Maggs:
Puncturable Pseudorandom Sets and Private Information Retrieval with Polylogarithmic Bandwidth and Sublinear Time. IACR Cryptol. ePrint Arch. 2020: 1592 (2020)
2010 – 2019
- 2019
- [j7]Dana Dachman-Soled, Chang Liu, Charalampos Papamanthou, Elaine Shi, Uzi Vishkin:
Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness. J. Cryptol. 32(3): 941-972 (2019) - [c105]Elaine Shi:
Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey). ASIACRYPT (1) 2019: 3-17 - [c104]Prabhanjan Ananth, Xiong Fan, Elaine Shi:
Towards Attribute-Based Encryption for RAMs from LWE: Sub-linear Decryption, and More. ASIACRYPT (1) 2019: 112-141 - [c103]Yue Guo, Rafael Pass, Elaine Shi:
Synchronous, with a Chance of Partition Tolerance. CRYPTO (1) 2019: 499-529 - [c102]Elaine Shi:
Analysis of Deterministic Longest-Chain Protocols. CSF 2019: 122-135 - [c101]Gilad Asharov, T.-H. Hubert Chan, Kartik Nayak, Rafael Pass, Ling Ren, Elaine Shi:
Locality-Preserving Oblivious RAM. EUROCRYPT (2) 2019: 214-243 - [c100]T.-H. Hubert Chan, Rafael Pass, Elaine Shi:
Consensus Through Herding. EUROCRYPT (1) 2019: 720-749 - [c99]Phil Daian, Rafael Pass, Elaine Shi:
Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake. Financial Cryptography 2019: 23-41 - [c98]Ittai Abraham, T.-H. Hubert Chan, Danny Dolev, Kartik Nayak, Rafael Pass, Ling Ren, Elaine Shi:
Communication Complexity of Byzantine Agreement, Revisited. PODC 2019: 317-326 - [c97]Wei-Kai Lin, Elaine Shi, Tiancheng Xie:
Can We Overcome the n log n Barrier for Oblivious Sorting? SODA 2019: 2419-2438 - [c96]T.-H. Hubert Chan, Kai-Min Chung, Bruce M. Maggs, Elaine Shi:
Foundations of Differentially Oblivious Algorithms. SODA 2019: 2448-2467 - [c95]Mu Zhang, Chien-Ying Chen, Bin-Chou Kao, Yassine Qamsane, Yuru Shao, Yikai Lin, Elaine Shi, Sibin Mohan, Kira Barton, James R. Moyne, Z. Morley Mao:
Towards Automated Safety Vetting of PLC Code in Real-World Plants. IEEE Symposium on Security and Privacy 2019: 522-538 - [c94]Alireza Farhadi, MohammadTaghi Hajiaghayi, Kasper Green Larsen, Elaine Shi:
Lower bounds for external memory integer sorting via network coding. STOC 2019: 997-1008 - [i73]T.-H. Hubert Chan, Zhibin Liang, Antigoni Polychroniadou, Elaine Shi:
Small Memory Robust Simulation of Client-Server Interactive Protocols over Oblivious Noisy Channels. CoRR abs/1910.12175 (2019) - [i72]Yue Guo, Rafael Pass, Elaine Shi:
Synchronous, with a Chance of Partition Tolerance. IACR Cryptol. ePrint Arch. 2019: 179 (2019) - [i71]T.-H. Hubert Chan, Rafael Pass, Elaine Shi:
Consensus through Herding. IACR Cryptol. ePrint Arch. 2019: 251 (2019) - [i70]Elaine Shi:
Path Oblivious Heap. IACR Cryptol. ePrint Arch. 2019: 274 (2019) - [i69]T.-H. Hubert Chan, Rafael Pass, Elaine Shi:
Round Complexity of Byzantine Agreement, Revisited. IACR Cryptol. ePrint Arch. 2019: 886 (2019) - [i68]Xiong Fan, Joshua Gancher, Greg Morrisett, Elaine Shi, Kristina Sojakova:
IPDL: A Probabilistic Dataflow Logic for Cryptography. IACR Cryptol. ePrint Arch. 2019: 1422 (2019) - 2018
- [j6]Emil Stefanov, Marten van Dijk, Elaine Shi, T.-H. Hubert Chan, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas:
Path ORAM: An Extremely Simple Oblivious RAM Protocol. J. ACM 65(4): 18:1-18:26 (2018) - [c93]T.-H. Hubert Chan, Jonathan Katz, Kartik Nayak, Antigoni Polychroniadou, Elaine Shi:
More is Less: Perfectly Secure Oblivious Algorithms in the Multi-server Setting. ASIACRYPT (3) 2018: 158-188 - [c92]Gilles Barthe, Xiong Fan, Joshua Gancher, Benjamin Grégoire, Charlie Jacomme, Elaine Shi:
Symbolic Proofs for Lattice-Based Cryptography. CCS 2018: 538-555 - [c91]Rafael Pass, Elaine Shi:
Thunderella: Blockchains with Optimistic Instant Confirmation. EUROCRYPT (2) 2018: 3-33 - [c90]T.-H. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi:
Cache-Oblivious and Data-Oblivious Sorting and Applications. SODA 2018: 2201-2220 - [c89]Ahmed E. Kosba, Charalampos Papamanthou, Elaine Shi:
xJsnark: A Framework for Efficient Verifiable Computation. IEEE Symposium on Security and Privacy 2018: 944-961 - [c88]Kai-Min Chung, Yue Guo, Wei-Kai Lin, Rafael Pass, Elaine Shi:
Game Theoretic Notions of Fairness in Multi-party Coin Toss. TCC (1) 2018: 563-596 - [c87]T.-H. Hubert Chan, Kartik Nayak, Elaine Shi:
Perfectly Secure Oblivious Parallel RAM. TCC (2) 2018: 636-668 - [i67]T.-H. Hubert Chan, Rafael Pass, Elaine Shi:
Communication-Efficient Byzantine Agreement without Erasures. CoRR abs/1805.03391 (2018) - [i66]T.-H. Hubert Chan, Jonathan Katz, Kartik Nayak, Antigoni Polychroniadou, Elaine Shi:
More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting. CoRR abs/1809.00825 (2018) - [i65]Alireza Farhadi, MohammadTaghi Hajiaghayi, Kasper Green Larsen, Elaine Shi:
Lower Bounds for External Memory Integer Sorting via Network Coding. CoRR abs/1811.01313 (2018) - [i64]Wei-Kai Lin, Elaine Shi, Tiancheng Xie:
Can We Overcome the n log n Barrier for Oblivious Sorting? IACR Cryptol. ePrint Arch. 2018: 227 (2018) - [i63]Rafael Pass, Elaine Shi:
Rethinking Large-Scale Consensus. IACR Cryptol. ePrint Arch. 2018: 302 (2018) - [i62]T.-H. Hubert Chan, Kartik Nayak, Elaine Shi:
Perfectly Secure Oblivious Parallel RAM. IACR Cryptol. ePrint Arch. 2018: 364 (2018) - [i61]Gilles Barthe, Xiong Fan, Joshua Gancher, Benjamin Grégoire, Charlie Jacomme, Elaine Shi:
Symbolic Proofs for Lattice-Based Cryptography. IACR Cryptol. ePrint Arch. 2018: 765 (2018) - [i60]T.-H. Hubert Chan, Jonathan Katz, Kartik Nayak, Antigoni Polychroniadou, Elaine Shi:
More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting. IACR Cryptol. ePrint Arch. 2018: 851 (2018) - [i59]Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Kartik Nayak, Elaine Shi:
OptORAMa: Optimal Oblivious RAM. IACR Cryptol. ePrint Arch. 2018: 892 (2018) - [i58]T.-H. Hubert Chan, Rafael Pass, Elaine Shi:
PiLi: An Extremely Simple Synchronous Blockchain. IACR Cryptol. ePrint Arch. 2018: 980 (2018) - [i57]T.-H. Hubert Chan, Rafael Pass, Elaine Shi:
PaLa: A Simple Partially Synchronous Blockchain. IACR Cryptol. ePrint Arch. 2018: 981 (2018) - [i56]Kai-Min Chung, Yue Guo, Wei-Kai Lin, Rafael Pass, Elaine Shi:
Game Theoretic Notions of Fairness in Multi-Party Coin Toss. IACR Cryptol. ePrint Arch. 2018: 1076 (2018) - [i55]Elaine Shi:
Analysis of Deterministic Longest-Chain Protocols. IACR Cryptol. ePrint Arch. 2018: 1079 (2018) - 2017
- [j5]Elaine Shi, T.-H. Hubert Chan, Eleanor Gilbert Rieffel, Dawn Song:
Distributed Private Data Analysis: Lower Bounds and Practical Constructions. ACM Trans. Algorithms 13(4): 50:1-50:38 (2017) - [c86]Rafael Pass, Elaine Shi:
The Sleepy Model of Consensus. ASIACRYPT (2) 2017: 380-409 - [c85]T.-H. Hubert Chan, Kai-Min Chung, Elaine Shi:
On the Depth of Oblivious Parallel RAM. ASIACRYPT (1) 2017: 567-597 - [c84]T.-H. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi:
Oblivious Hashing Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM. ASIACRYPT (1) 2017: 660-690 - [c83]Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed E. Kosba, Ari Juels, Elaine Shi:
Solidus: Confidential Distributed Ledger Transactions via PVORM. CCS 2017: 701-717 - [c82]Rafael Pass, Elaine Shi:
Rethinking Large-Scale Consensus. CSF 2017: 115-129 - [c81]Rafael Pass, Elaine Shi, Florian Tramèr:
Formal Abstractions for Attested Execution Secure Processors. EUROCRYPT (1) 2017: 260-289 - [c80]Florian Tramèr, Fan Zhang, Huang Lin, Jean-Pierre Hubaux, Ari Juels, Elaine Shi:
Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge. EuroS&P 2017: 19-34 - [c79]Kartik Nayak, Christopher W. Fletcher, Ling Ren, Nishanth Chandran, Satya V. Lokam, Elaine Shi, Vipul Goyal:
HOP: Hardware makes Obfuscation Practical. NDSS 2017 - [c78]Rafael Pass, Elaine Shi:
FruitChains: A Fair Blockchain. PODC 2017: 315-324 - [c77]T.-H. Hubert Chan, Elaine Shi:
Circuit OPRAM: Unifying Statistically and Computationally Secure ORAMs and OPRAMs. TCC (2) 2017: 72-107 - [c76]Rafael Pass, Elaine Shi:
Hybrid Consensus: Efficient Consensus in the Permissionless Model. DISC 2017: 39:1-39:16 - [i54]Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed E. Kosba, Ari Juels, Elaine Shi:
Solidus: Confidential Distributed Ledger Transactions via PVORM. IACR Cryptol. ePrint Arch. 2017: 317 (2017) - [i53]Gilad Asharov, T.-H. Hubert Chan, Kartik Nayak, Rafael Pass, Ling Ren, Elaine Shi:
Oblivious Computation with Data Locality. IACR Cryptol. ePrint Arch. 2017: 772 (2017) - [i52]T.-H. Hubert Chan, Kai-Min Chung, Elaine Shi:
On the Depth of Oblivious Parallel RAM. IACR Cryptol. ePrint Arch. 2017: 861 (2017) - [i51]Rafael Pass, Elaine Shi:
Thunderella: Blockchains with Optimistic Instant Confirmation. IACR Cryptol. ePrint Arch. 2017: 913 (2017) - [i50]T.-H. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi:
Cache-Oblivious and Data-Oblivious Sorting and Applications. IACR Cryptol. ePrint Arch. 2017: 914 (2017) - [i49]T.-H. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi:
Oblivious Hashing Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM. IACR Cryptol. ePrint Arch. 2017: 924 (2017) - [i48]T.-H. Hubert Chan, Kai-Min Chung, Bruce M. Maggs, Elaine Shi:
Foundations of Differentially Oblivious Algorithms. IACR Cryptol. ePrint Arch. 2017: 1033 (2017) - 2016
- [c75]Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, Dawn Song:
The Honey Badger of BFT Protocols. CCS 2016: 31-42 - [c74]Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, Elaine Shi:
Town Crier: An Authenticated Data Feed for Smart Contracts. CCS 2016: 270-282 - [c73]Ari Juels, Ahmed E. Kosba, Elaine Shi:
The Ring of Gyges: Investigating the Future of Criminal Smart Contracts. CCS 2016: 283-295 - [c72]Kartik Nayak, Srijan Kumar, Andrew Miller, Elaine Shi:
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack. EuroS&P 2016: 305-320 - [c71]Youngsam Park, Damon McCoy, Elaine Shi:
Understanding Craigslist Rental Scams. Financial Cryptography 2016: 3-21 - [c70]Kevin Delmolino, Mitchell Arnett, Ahmed E. Kosba, Andrew Miller, Elaine Shi:
Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab. Financial Cryptography Workshops 2016: 79-94 - [c69]Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed E. Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gün Sirer, Dawn Song, Roger Wattenhofer:
On Scaling Decentralized Blockchains - (A Position Paper). Financial Cryptography Workshops 2016: 106-125 - [c68]Ahmed E. Kosba, Andrew Miller, Elaine Shi, Zikai Wen, Charalampos Papamanthou:
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. IEEE Symposium on Security and Privacy 2016: 839-858 - [c67]Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren, Elaine Shi, Daniel Wichs:
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM. TCC (A2) 2016: 145-174 - [c66]Xiaojing Liao, Chang Liu, Damon McCoy, Elaine Shi, Shuang Hao, Raheem A. Beyah:
Characterizing Long-tail SEO Spam on Cloud Web Hosting Services. WWW 2016: 321-332 - [p3]Damon McCoy, Youngsam Park, Elaine Shi, Markus Jakobsson:
Identifying Scams and Trends. Understanding Social Engineering Based Scams 2016: 7-19 - [p2]Damon McCoy, Youngsam Park, Elaine Shi, Markus Jakobsson:
Case Study: Sales Scams. Understanding Social Engineering Based Scams 2016: 77-87 - [p1]Damon McCoy, Youngsam Park, Elaine Shi, Markus Jakobsson:
Case Study: Rental Scams. Understanding Social Engineering Based Scams 2016: 89-102 - [i47]Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, Elaine Shi:
Town Crier: An Authenticated Data Feed for Smart Contracts. IACR Cryptol. ePrint Arch. 2016: 168 (2016) - [i46]Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, Dawn Song:
The Honey Badger of BFT Protocols. IACR Cryptol. ePrint Arch. 2016: 199 (2016) - [i45]Ari Juels, Ahmed E. Kosba, Elaine Shi:
The Ring of Gyges: Investigating the Future of Criminal Smart Contracts. IACR Cryptol. ePrint Arch. 2016: 358 (2016) - [i44]Florian Tramèr, Fan Zhang, Huang Lin, Jean-Pierre Hubaux, Ari Juels, Elaine Shi:
Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge. IACR Cryptol. ePrint Arch. 2016: 635 (2016) - [i43]Rafael Pass, Elaine Shi:
FruitChains: A Fair Blockchain. IACR Cryptol. ePrint Arch. 2016: 916 (2016) - [i42]Rafael Pass, Elaine Shi:
Hybrid Consensus: Efficient Consensus in the Permissionless Model. IACR Cryptol. ePrint Arch. 2016: 917 (2016) - [i41]Iddo Bentov, Rafael Pass, Elaine Shi:
The Sleepy Model of Consensus. IACR Cryptol. ePrint Arch. 2016: 918 (2016) - [i40]Iddo Bentov, Rafael Pass, Elaine Shi:
Snow White: Provably Secure Proofs of Stake. IACR Cryptol. ePrint Arch. 2016: 919 (2016) - [i39]Rafael Pass, Elaine Shi, Florian Tramèr:
Formal Abstractions for Attested Execution Secure Processors. IACR Cryptol. ePrint Arch. 2016: 1027 (2016) - [i38]T.-H. Hubert Chan, Elaine Shi:
Circuit OPRAM: A (Somewhat) Tight Oblivious Parallel RAM. IACR Cryptol. ePrint Arch. 2016: 1084 (2016) - 2015
- [c65]Dana Dachman-Soled, Chang Liu, Charalampos Papamanthou, Elaine Shi, Uzi Vishkin:
Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness. ASIACRYPT (1) 2015: 337-359 - [c64]Chang Liu, Austin Harris, Martin Maas, Michael W. Hicks, Mohit Tiwari, Elaine Shi:
GhostRider: A Hardware-Software System for Memory Trace Oblivious Computation. ASPLOS 2015: 87-101 - [c63]Andrew Miller, Ahmed E. Kosba, Jonathan Katz, Elaine Shi:
Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions. CCS 2015: 680-691 - [c62]Xiao Wang, T.-H. Hubert Chan, Elaine Shi:
Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound. CCS 2015: 850-861 - [c61]S. Dov Gordon, Feng-Hao Liu, Elaine Shi:
Constant-Round MPC with Fairness and Guarantee of Output Delivery. CRYPTO (2) 2015: 63-82 - [c60]Chang Liu, Xiao Shaun Wang, Kartik Nayak, Yan Huang, Elaine Shi:
ObliVM: A Programming Framework for Secure Computation. IEEE Symposium on Security and Privacy 2015: 359-376 - [c59]Kartik Nayak, Xiao Shaun Wang, Stratis Ioannidis, Udi Weinsberg, Nina Taft, Elaine Shi:
GraphSC: Parallel Secure Computation Made Easy. IEEE Symposium on Security and Privacy 2015: 377-394 - [c58]S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:
Multi-Client Verifiable Computation with Stronger Security Guarantees. TCC (2) 2015: 144-168 - [c57]Dana Dachman-Soled, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:
Locally Decodable and Updatable Non-malleable Codes and Their Applications. TCC (1) 2015: 427-450 - [c56]Ling Ren, Christopher W. Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, Srinivas Devadas:
Constants Count: Practical Improvements to Oblivious RAM. USENIX Security Symposium 2015: 415-430 - [e4]Lucas Chi Kwong Hui, S. H. Qing, Elaine Shi, Siu-Ming Yiu:
Information and Communications Security - 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8958, Springer 2015, ISBN 978-3-319-21965-3 [contents] - [i37]Dana Dachman-Soled, Chang Liu, Charalampos Papamanthou, Elaine Shi, Uzi Vishkin:
Oblivious Network RAM. IACR Cryptol. ePrint Arch. 2015: 73 (2015) - [i36]S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:
Multi-Client Verifiable Computation with Stronger Security Guarantees. IACR Cryptol. ePrint Arch. 2015: 142 (2015) - [i35]Xiao Shaun Wang, Chang Liu, Kartik Nayak, Yan Huang, Elaine Shi:
iDASH Secure Genome Analysis Competition Using ObliVM. IACR Cryptol. ePrint Arch. 2015: 191 (2015) - [i34]S. Dov Gordon, Feng-Hao Liu, Elaine Shi:
Constant-Round MPC with Fairness and Guarantee of Output Delivery. IACR Cryptol. ePrint Arch. 2015: 371 (2015) - [i33]Kevin Delmolino, Mitchell Arnett, Ahmed E. Kosba, Andrew Miller, Elaine Shi:
Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab. IACR Cryptol. ePrint Arch. 2015: 460 (2015) - [i32]Ahmed E. Kosba, Andrew Miller, Elaine Shi, Zikai Wen, Charalampos Papamanthou:
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. IACR Cryptol. ePrint Arch. 2015: 675 (2015) - [i31]Kartik Nayak, Srijan Kumar, Andrew Miller, Elaine Shi:
Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack. IACR Cryptol. ePrint Arch. 2015: 796 (2015) - [i30]Antonio Marcedone, Zikai Wen, Elaine Shi:
Secure Dating with Four or Fewer Cards. IACR Cryptol. ePrint Arch. 2015: 1031 (2015) - [i29]Christopher W. Fletcher, Muhammad Naveed, Ling Ren, Elaine Shi, Emil Stefanov:
Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM. IACR Cryptol. ePrint Arch. 2015: 1065 (2015) - [i28]Ahmed E. Kosba, Zhichao Zhao, Andrew Miller, Yi Qian, T.-H. Hubert Chan, Charalampos Papamanthou, Rafael Pass, Abhi Shelat, Elaine Shi:
How to Use SNARKs in Universally Composable Protocols. IACR Cryptol. ePrint Arch. 2015: 1093 (2015) - [i27]Andrew Miller, Michael W. Hicks, Jonathan Katz, Elaine Shi:
How to Authenticate any Data Structure. Adv. Math. Commun. 3 (2015) - 2014
- [j4]Neil Zhenqiang Gong, Ameet Talwalkar, Lester W. Mackey, Ling Huang, Eui Chul Richard Shin, Emil Stefanov, Elaine Shi, Dawn Song:
Joint Link Prediction and Attribute Inference Using a Social-Attribute Network. ACM Trans. Intell. Syst. Technol. 5(2): 27:1-27:20 (2014) - [c55]Elaine Shi:
Emil Stefanov: Bridging the Theory and Practice of Cloud Computing Security. CCSW 2014: 7-8 - [c54]Xiao Shaun Wang, Yan Huang, T.-H. Hubert Chan, Abhi Shelat, Elaine Shi:
SCORAM: Oblivious RAM for Secure Computation. CCS 2014: 191-202 - [c53]Xiao Shaun Wang, Kartik Nayak, Chang Liu, T.-H. Hubert Chan, Elaine Shi, Emil Stefanov, Yan Huang:
Oblivious Data Structures. CCS 2014: 215-226 - [c52]Warren He, Devdatta Akhawe, Sumeet Jain, Elaine Shi, Dawn Xiaodong Song:
ShadowCrypt: Encrypted Web Applications for Everyone. CCS 2014: 1028-1039 - [c51]Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, Hong-Sheng Zhou:
Multi-input Functional Encryption. EUROCRYPT 2014: 578-602 - [c50]Paarijaat Aditya, Viktor Erdélyi, Matthew Lentz, Elaine Shi, Bobby Bhattacharjee, Peter Druschel:
EnCore: private, context-based communication for mobile social apps. MobiSys 2014: 135-148 - [c49]Youngsam Park, Jackie Jones, Damon McCoy, Elaine Shi, Markus Jakobsson:
Scambaiter: Understanding Targeted Nigerian Scams on Craigslist. NDSS 2014 - [c48]Emil Stefanov, Charalampos Papamanthou, Elaine Shi:
Practical Dynamic Searchable Encryption with Small Leakage. NDSS 2014 - [c47]Daniel Apon, Jonathan Katz, Elaine Shi, Aishwarya Thiruvengadam:
Verifiable Oblivious Storage. Public Key Cryptography 2014: 131-148 - [c46]Andrew Miller, Michael Hicks, Jonathan Katz, Elaine Shi:
Authenticated data structures, generically. POPL 2014: 411-424 - [c45]Nachikethas A. Jagadeesan, Ranjan Pal, Kaushik Nadikuditi, Yan Huang, Elaine Shi, Minlan Yu:
A secure computation framework for SDNs. HotSDN 2014: 209-210 - [c44]Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, Jonathan Katz:
Permacoin: Repurposing Bitcoin Work for Data Preservation. IEEE Symposium on Security and Privacy 2014: 475-490 - [c43]Chang Liu, Yan Huang, Elaine Shi, Jonathan Katz, Michael W. Hicks:
Automating Efficient RAM-Model Secure Computation. IEEE Symposium on Security and Privacy 2014: 623-638 - [c42]Jonathan L. Dautrich Jr., Emil Stefanov, Elaine Shi:
Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns. USENIX Security Symposium 2014: 749-764 - [c41]Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos:
TRUESET: Faster Verifiable Set Computations. USENIX Security Symposium 2014: 765-780 - [c40]Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee:
SDDR: Light-Weight, Secure Mobile Encounters. USENIX Security Symposium 2014: 925-940 - [e3]Robert H. Deng, Elaine Shi, Kui Ren:
Proceedings of the Second International Workshop on Security in Cloud Computing, SCC@ASIACCS '14, Kyoto, Japan, June 3, 2014. ACM 2014, ISBN 978-1-4503-2805-0 [contents] - [i26]Daniel Apon, Jonathan Katz, Elaine Shi, Aishwarya Thiruvengadam:
Verifiable Oblivious Storage. IACR Cryptol. ePrint Arch. 2014: 153 (2014) - [i25]Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos:
TRUESET: Nearly Practical Verifiable Set Computations. IACR Cryptol. ePrint Arch. 2014: 160 (2014) - [i24]Xiao Wang, Kartik Nayak, Chang Liu, Elaine Shi, Emil Stefanov, Yan Huang:
Oblivious Data Structures. IACR Cryptol. ePrint Arch. 2014: 185 (2014) - [i23]Dana Dachman-Soled, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:
Locally Decodable and Updatable Non-Malleable Codes and Their Applications. IACR Cryptol. ePrint Arch. 2014: 663 (2014) - [i22]Xiao Shaun Wang, Yan Huang, T.-H. Hubert Chan, Abhi Shelat, Elaine Shi:
SCORAM: Oblivious RAM for Secure Computation. IACR Cryptol. ePrint Arch. 2014: 671 (2014) - [i21]Xiao Wang, T.-H. Hubert Chan, Elaine Shi:
Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound. IACR Cryptol. ePrint Arch. 2014: 672 (2014) - [i20]Jonathan Katz, Andrew Miller, Elaine Shi:
Pseudonymous Secure Computation from Time-Lock Puzzles. IACR Cryptol. ePrint Arch. 2014: 857 (2014) - [i19]Xavier Boyen, Xiong Fan, Elaine Shi:
Adaptively Secure Fully Homomorphic Signatures Based on Lattices. IACR Cryptol. ePrint Arch. 2014: 916 (2014) - [i18]Ling Ren, Christopher W. Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, Srinivas Devadas:
Ring ORAM: Closing the Gap Between Small and Large Client Storage Oblivious RAM. IACR Cryptol. ePrint Arch. 2014: 997 (2014) - 2013
- [c39]Emil Stefanov, Elaine Shi:
Multi-cloud oblivious storage. CCS 2013: 247-258 - [c38]Emil Stefanov, Marten van Dijk, Elaine Shi, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas:
Path ORAM: an extremely simple oblivious RAM protocol. CCS 2013: 299-310 - [c37]Martin Maas, Eric Love, Emil Stefanov, Mohit Tiwari, Elaine Shi, Krste Asanovic, John Kubiatowicz, Dawn Song:
PHANTOM: practical oblivious computation in a secure processor. CCS 2013: 311-324 - [c36]Elaine Shi, Emil Stefanov, Charalampos Papamanthou:
Practical dynamic proofs of retrievability. CCS 2013: 325-336 - [c35]Blaine Nelson, Christos Dimitrakakis, Elaine Shi:
Summary/overview for artificial intelligence and security (AISec'13). CCS 2013: 1483-1484 - [c34]Chang Liu, Michael Hicks, Elaine Shi:
Memory Trace Oblivious Program Execution. CSF 2013: 51-65 - [c33]Charalampos Papamanthou, Elaine Shi, Roberto Tamassia, Ke Yi:
Streaming Authenticated Data Structures. EUROCRYPT 2013: 353-370 - [c32]Emil Stefanov, Elaine Shi:
ObliviStore: High Performance Oblivious Distributed Cloud Data Store. NDSS 2013 - [c31]Emil Stefanov, Elaine Shi:
ObliviStore: High Performance Oblivious Cloud Storage. IEEE Symposium on Security and Privacy 2013: 253-267 - [c30]Charalampos Papamanthou, Elaine Shi, Roberto Tamassia:
Signatures of Correct Computation. TCC 2013: 222-242 - [e2]Ahmad-Reza Sadeghi, Blaine Nelson, Christos Dimitrakakis, Elaine Shi:
AISec'13, Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Co-located with CCS 2013, Berlin, Germany, November 4, 2013. ACM 2013, ISBN 978-1-4503-2488-5 [contents] - [e1]Xingming Sun, Elaine Shi, Kui Ren:
Proceedings of the 2013 International Workshop on Security in Cloud Computing, SCC@ASIACCS '13, Hangzhou, China, May 8, 2013. ACM 2013, ISBN 978-1-4503-2067-2 [contents] - [i17]Emil Stefanov, Marten van Dijk, Elaine Shi, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas:
Path ORAM: An Extremely Simple Oblivious RAM Protocol. IACR Cryptol. ePrint Arch. 2013: 280 (2013) - [i16]S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:
Multi-Input Functional Encryption. IACR Cryptol. ePrint Arch. 2013: 774 (2013) - [i15]Emil Stefanov, Charalampos Papamanthou, Elaine Shi:
Practical Dynamic Searchable Encryption with Small Leakage. IACR Cryptol. ePrint Arch. 2013: 832 (2013) - 2012
- [j3]Dawn Song, Elaine Shi, Ian Fischer, Umesh Shankar:
Cloud Data Protection for the Masses. Computer 45(1): 39-45 (2012) - [c29]T.-H. Hubert Chan, Elaine Shi, Dawn Song:
Optimal Lower Bound for Differentially Private Multi-party Aggregation. ESA 2012: 277-288 - [c28]T.-H. Hubert Chan, Elaine Shi, Dawn Song:
Privacy-Preserving Stream Aggregation with Fault Tolerance. Financial Cryptography 2012: 200-214 - [c27]Simon Barber, Xavier Boyen, Elaine Shi, Ersin Uzun:
Bitter to Better - How to Make Bitcoin a Better Currency. Financial Cryptography 2012: 399-414 - [c26]Gabriel Maganis, Elaine Shi, Hao Chen, Dawn Song:
Opaak: using mobile phones to limit anonymous identities online. MobiSys 2012: 295-308 - [c25]Emil Stefanov, Elaine Shi, Dawn Xiaodong Song:
Towards Practical Oblivious RAM. NDSS 2012 - [c24]T.-H. Hubert Chan, Mingfei Li, Elaine Shi, Wenchang Xu:
Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams. Privacy Enhancing Technologies 2012: 140-159 - [c23]Emil Stefanov, Elaine Shi, Dawn Song:
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies. Public Key Cryptography 2012: 413-430 - [c22]Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, Dawn Song, David E. Culler:
GUPT: privacy preserving data analysis made easy. SIGMOD Conference 2012: 349-360 - [c21]Mohit Tiwari, Prashanth Mohan, Andrew Osheroff, Hilfi Alkaff, Elaine Shi, Eric Love, Dawn Song, Krste Asanovic:
Context-centric Security. HotSec 2012 - [i14]Emil Stefanov, Elaine Shi:
Path O-RAM: An Extremely Simple Oblivious RAM Protocol. CoRR abs/1202.5150 (2012) - [i13]T.-H. Hubert Chan, Mingfei Li, Elaine Shi, Wenchang Xu:
Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams. IACR Cryptol. ePrint Arch. 2012: 218 (2012) - [i12]Emil Stefanov, Elaine Shi:
FastPRP: Fast Pseudo-Random Permutations for Small Domains. IACR Cryptol. ePrint Arch. 2012: 254 (2012) - [i11]T.-H. Hubert Chan, Elaine Shi, Dawn Song:
Optimal Lower Bound for Differentially Private Multi-Party Aggregation. IACR Cryptol. ePrint Arch. 2012: 373 (2012) - 2011
- [j2]T.-H. Hubert Chan, Elaine Shi, Dawn Song:
Private and Continual Release of Statistics. ACM Trans. Inf. Syst. Secur. 14(3): 26:1-26:24 (2011) - [c20]Elaine Shi, T.-H. Hubert Chan, Emil Stefanov, Mingfei Li:
Oblivious RAM with O((logN)3) Worst-Case Cost. ASIACRYPT 2011: 197-214 - [c19]Petros Maniatis, Devdatta Akhawe, Kevin R. Fall, Elaine Shi, Dawn Song:
Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection. HotOS 2011 - [c18]Arvind Narayanan, Elaine Shi, Benjamin I. P. Rubinstein:
Link prediction by de-anonymization: How We Won the Kaggle Social Network Challenge. IJCNN 2011: 1825-1834 - [c17]Elaine Shi, T.-H. Hubert Chan, Eleanor Gilbert Rieffel, Richard Chow, Dawn Song:
Privacy-Preserving Aggregation of Time-Series Data. NDSS 2011 - [c16]Daisuke Mashima, Prateek Sarkar, Elaine Shi, Chris Li, Richard Chow, Dawn Song:
Privacy settings from contextual attributes: A case study using Google Buzz. PerCom Workshops 2011: 257-262 - [c15]Hsu-Chun Hsiao, Ahren Studer, Rituik Dubey, Elaine Shi, Adrian Perrig:
Efficient and secure threshold-based event validation for VANETs. WISEC 2011: 163-174 - [i10]Arvind Narayanan, Elaine Shi, Benjamin I. P. Rubinstein:
Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge. CoRR abs/1102.4374 (2011) - [i9]Emil Stefanov, Elaine Shi, Dawn Song:
Towards Practical Oblivious RAM. CoRR abs/1106.3652 (2011) - [i8]Neil Zhenqiang Gong, Ameet Talwalkar, Lester W. Mackey, Ling Huang, Eui Chul Richard Shin, Emil Stefanov, Elaine Shi, Dawn Song:
Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN). CoRR abs/1112.3265 (2011) - [i7]Elaine Shi, T.-H. Hubert Chan, Emil Stefanov, Mingfei Li:
Oblivious RAM with O((log N)3) Worst-Case Cost. IACR Cryptol. ePrint Arch. 2011: 407 (2011) - [i6]Emil Stefanov, Elaine Shi, Dawn Song:
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies. IACR Cryptol. ePrint Arch. 2011: 509 (2011) - [i5]Charalampos Papamanthou, Elaine Shi, Roberto Tamassia:
Publicly Verifiable Delegation of Computation. IACR Cryptol. ePrint Arch. 2011: 587 (2011) - [i4]T.-H. Hubert Chan, Elaine Shi, Dawn Song:
Privacy-Preserving Stream Aggregation with Fault Tolerance. IACR Cryptol. ePrint Arch. 2011: 655 (2011) - 2010
- [c14]Richard Chow, Markus Jakobsson, Ryusuke Masuoka, Jesus Molina, Yuan Niu, Elaine Shi, Zhexuan Song:
Authentication in the clouds: a framework and its application to mobile users. CCSW 2010: 1-6 - [c13]John Bethencourt, Elaine Shi, Dawn Song:
Signatures of Reputation. Financial Cryptography 2010: 400-407 - [c12]T.-H. Hubert Chan, Elaine Shi, Dawn Song:
Private and Continual Release of Statistics. ICALP (2) 2010: 405-417 - [c11]Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Chow:
Implicit Authentication through Learning User Behavior. ISC 2010: 99-113 - [i3]T.-H. Hubert Chan, Elaine Shi, Dawn Song:
Private and Continual Release of Statistics. IACR Cryptol. ePrint Arch. 2010: 76 (2010)
2000 – 2009
- 2009
- [c10]Richard Chow, Philippe Golle, Markus Jakobsson, Elaine Shi, Jessica Staddon, Ryusuke Masuoka, Jesus Molina:
Controlling data in the cloud: outsourcing computation without outsourcing control. CCSW 2009: 85-90 - [c9]Ahren Studer, Elaine Shi, Fan Bai, Adrian Perrig:
TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs. SECON 2009: 1-9 - [c8]Emily Shen, Elaine Shi, Brent Waters:
Predicate Privacy in Encryption Systems. TCC 2009: 457-473 - 2008
- [c7]Elaine Shi, Brent Waters:
Delegating Capabilities in Predicate Encryption Systems. ICALP (2) 2008: 560-578 - [i2]Elaine Shi, Brent Waters:
Delegating Capabilities in Predicate Encryption Systems. IACR Cryptol. ePrint Arch. 2008: 279 (2008) - [i1]Emily Shen, Elaine Shi, Brent Waters:
Predicate Privacy in Encryption Systems. IACR Cryptol. ePrint Arch. 2008: 536 (2008) - 2007
- [c6]Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce M. Maggs, Yih-Chun Hu:
Portcullis: protecting connection setup from denial-of-capability attacks. SIGCOMM 2007: 289-300 - [c5]Elaine Shi, John Bethencourt, T.-H. Hubert Chan, Dawn Xiaodong Song, Adrian Perrig:
Multi-Dimensional Range Query over Encrypted Data. S&P 2007: 350-364 - 2005
- [c4]Arvind Seshadri, Mark Luk, Elaine Shi, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla:
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. SOSP 2005: 1-16 - [c3]Jonathan M. McCune, Elaine Shi, Adrian Perrig, Michael K. Reiter:
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. S&P 2005: 64-78 - [c2]Elaine Shi, Adrian Perrig, Leendert van Doorn:
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems. S&P 2005: 154-168 - 2004
- [j1]Elaine Shi, Adrian Perrig:
Designing secure sensor networks. IEEE Wirel. Commun. 11(6): 38-43 (2004) - [c1]James Newsome, Elaine Shi, Dawn Xiaodong Song, Adrian Perrig:
The sybil attack in sensor networks: analysis & defenses. IPSN 2004: 259-268
Coauthor Index
aka: Srinivas Devadas
aka: Dawn Xiaodong Song
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint