Yael Tauman Kalai
#20,074
Most Influential Person Now
Cryptographer and theoretical computer scientist
Yael Tauman Kalai's AcademicInfluence.com Rankings
Yael Tauman Kalaicomputer-science Degrees
Computer Science
#1008
World Rank
#1044
Historical Rank
Theoretical Computer Science
#133
World Rank
#133
Historical Rank
Yael Tauman Kalaimathematics Degrees
Mathematics
#3506
World Rank
#5157
Historical Rank
Measure Theory
#2959
World Rank
#3514
Historical Rank
Download Badge
Computer Science Mathematics
Yael Tauman Kalai's Degrees
- Bachelors Mathematics Tel Aviv University
Similar Degrees You Can Earn
Why Is Yael Tauman Kalai Influential?
(Suggest an Edit or Addition)According to Wikipedia, Yael Tauman Kalai is a cryptographer and theoretical computer scientist who works as a Senior Principal Researcher at Microsoft Research New England and as an adjunct professor at MIT in the Computer Science and Artificial Intelligence Lab.
Yael Tauman Kalai's Published Works
Published Works
- How to Leak a Secret (2001) (1621)
- Delegating computation: interactive proofs for muggles (2008) (469)
- Improved Delegation of Computation using Fully Homomorphic Encryption (2010) (401)
- Reusable garbled circuits and succinct functional encryption (2013) (392)
- Improved Online/Offline Signature Schemes (2001) (386)
- On the (In)security of the Fiat-Shamir paradigm (2003) (354)
- One-Time Programs (2008) (232)
- Protecting Obfuscation against Algebraic Attacks (2014) (230)
- Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage (2010) (222)
- On cryptography with auxiliary input (2009) (213)
- On the impossibility of obfuscation with auxiliary input (2005) (202)
- Smooth Projective Hashing and Two-Message Oblivious Transfer (2005) (201)
- Public-Key Encryption Schemes with Auxiliary Inputs (2010) (196)
- Delegating Computation (2015) (190)
- How to Run Turing Machines on Encrypted Data (2013) (184)
- Robustness of the Learning with Errors Assumption (2010) (183)
- How to delegate computations: the power of no-signaling proofs (2014) (132)
- Memory Delegation (2011) (132)
- How to Leak a Secret: Theory and Applications of Ring Signatures (2006) (106)
- On Symmetric Encryption and Point Obfuscation (2010) (79)
- From Obfuscation to the Security of Fiat-Shamir for Proofs (2017) (78)
- Interactive PCP (2008) (76)
- Cryptography with Tamperable and Leaky Memory (2011) (73)
- A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model (2010) (73)
- Black-Box Circular-Secure Encryption beyond Affine Functions (2011) (69)
- Efficient Interactive Coding against Adversarial Noise (2012) (66)
- Delegation for bounded space (2013) (65)
- Probabilistically Checkable Arguments (2009) (63)
- Cryptographic Assumptions: A Position Paper (2016) (60)
- Obfuscation for Evasive Functions (2014) (54)
- On Virtual Grey Box Obfuscation for General Circuits (2017) (52)
- Multi-collision resistance: a paradigm for keyless hash functions (2018) (51)
- Multiparty computation secure against continual memory leakage (2012) (50)
- Distinguisher-Dependent Simulation in Two Rounds and its Applications (2017) (49)
- Concurrent general composition of secure protocols in the timing model (2005) (49)
- The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator (2014) (46)
- Promise Zero Knowledge and its Applications to Round Optimal MPC (2018) (44)
- Program Obfuscation with Leaky Hardware (2011) (44)
- Non-interactive delegation and batch NP verification from standard computational assumptions (2017) (44)
- 2-Source Extractors under Computational Assumptions and Cryptography with Defective Randomness (2009) (43)
- Delegating RAM Computations (2016) (43)
- Fast Interactive Coding against Adversarial Noise (2014) (41)
- Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond (2012) (38)
- A Survey of Leakage-Resilient Cryptography (2019) (37)
- Network Extractor Protocols (2008) (37)
- How to delegate computations publicly (2019) (35)
- Secure Computation against Adaptive Auxiliary Information (2013) (35)
- Cryptography Resilient to Continual Memory Leakage (2010) (33)
- Statistical Witness Indistinguishability (and more) in Two Messages (2018) (31)
- Concurrent Composition of Secure Protocols in the Timing Model (2007) (30)
- On Obfuscation with Random Oracles (2015) (30)
- Privacy-Preserving Automated Exposure Notification (2020) (29)
- Securing Circuits against Constant-Rate Tampering (2012) (29)
- Leakage-resilient coin tossing (2011) (28)
- Interactive Coding for Multiparty Protocols (2015) (27)
- Succinct Non-Interactive Zero-Knowledge Proofs with Preprocessing for LOGSNP (2006) (26)
- Beyond Perturbations: Learning Guarantees with Arbitrary Adversarial Test Examples (2020) (25)
- SNARGs for bounded depth computations and PPAD hardness from sub-exponential LWE (2020) (25)
- Succinct delegation for low-space non-deterministic computation (2018) (22)
- Arguments of Proximity - [Extended Abstract] (2015) (20)
- 3-Message Zero Knowledge Against Human Ignorance (2016) (19)
- Leaky Pseudo-Entropy Functions (2011) (19)
- Adaptively Secure Coin-Flipping, Revisited (2015) (19)
- Constant-Rate Interactive Coding Is Impossible, Even in Constant-Degree Networks (2019) (18)
- Securing Circuits and Protocols against 1/poly(k) Tampering Rate (2014) (17)
- A Parallel Repetition Theorem for Leakage Resilience (2012) (16)
- Formulas Resilient to Short-Circuit Errors (2012) (16)
- A Lower Bound for Adaptively-Secure Collective Coin Flipping Protocols (2018) (15)
- On Publicly Verifiable Delegation From Standard Assumptions (2018) (14)
- Non-Interactive Delegation for Low-Space Non-Deterministic Computation (2017) (11)
- Non-Interactive Non-Malleability from Quantum Supremacy (2019) (11)
- Extractors and the Leftover Hash Lemma (2011) (11)
- Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs for P (2021) (10)
- Non-Interactive RAM and Batch NP Delegation from any PIR (2016) (9)
- Proofs of Ignorance and Applications to 2-Message Witness Hiding (2018) (9)
- On the Space Complexity of Linear Programming with Preprocessing (2016) (9)
- Delegation with Updatable Unambiguous Proofs and PPAD-Hardness (2020) (9)
- Quantum Advantage from Any Non-Local Game (2022) (8)
- Circular-Secure Encryption Beyond Affine Functions (2009) (8)
- Efficient Multiparty Interactive Coding for Insertions, Deletions, and Substitutions (2019) (8)
- Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control (2020) (7)
- Low Error Efficient Computational Extractors in the CRS Model (2020) (6)
- Interactive Coding with Constant Round and Communication Blowup (2018) (6)
- Compressing Communication in Distributed Protocols (2015) (5)
- Overcoming the Worst-Case Curse for Cryptographic Constructions (2013) (5)
- Succinct Classical Verification of Quantum Computation (2022) (5)
- SNARGs for Bounded Depth Computations from Sub-Exponential LWE (2020) (5)
- Computational Extractors with Negligible Error in the CRS Model (2019) (4)
- Fully Homomorphic NIZK and NIWI Proofs (2019) (4)
- Monotone Batch NP-Delegation with Applications to Access Control (2018) (4)
- Theory of Cryptography (2014) (3)
- Attacks on the Fiat-Shamir paradigm and program obfuscation (2006) (3)
- A note on the impossibility of obfuscation (2014) (3)
- Deterministic and Efficient Interactive Coding from Hard-to-Decode Tree Codes (2020) (3)
- Non-signaling proofs with o(√ log n) provers are in PSPACE (2020) (3)
- Interactive error correcting codes over binary erasure channels resilient to > ½ adversarial corruption (2022) (2)
- Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface (2007) (2)
- Introduction to Homomorphic Encryption (2011) (2)
- Rate-1 Non-Interactive Arguments for Batch-NP and Applications (2022) (2)
- Theory of Cryptography (2017) (2)
- Boosting Batch Arguments and RAM Delegation (2022) (2)
- PPAD-Hardness and Delegation with Unambiguous Proofs (2020) (2)
- Circuits resilient to short-circuit errors (2022) (1)
- SNARGs and PPAD Hardness from the Decisional Diffie-Hellman Assumption (2022) (1)
- On Virtual Grey Box Obfuscation for General Circuits (2016) (1)
- Non-Signaling Proofs with $O(\sqrt{\log n})$ Provers are in PSPACE (2019) (1)
- Constructive Post-Quantum Reductions (2022) (1)
- Efficient Multiparty Interactive Coding—Part II: Non-Oblivious Noise (2022) (1)
- How to Delegate Computations: The Power of No-Signaling Proofs (2021) (1)
- The impossibility of obfuscation with a universal simulator (2014) (1)
- Interactive Error Correcting Codes Over Binary Erasure Channels Resilient to $>\frac12$ Adversarial Corruption (2021) (1)
- Public-Key Encryption Schemes with Auxiliary Inputs . Theory of Cryptography Citation (2009) (1)
- Lecture 18: Mixnet Voting Systems (2004) (0)
- Interactive Coding with Small Memory (2022) (0)
- Identifying unpredictable test examples with worst-case guarantees (2020) (0)
- Efficient Multiparty Interactive Coding—Part I: Oblivious Insertions, Deletions and Substitutions (2021) (0)
- Robustness of the Learning with Errors Assumption Citation (2009) (0)
- Witness Indistinguishability for any Single-Round Argument (2020) (0)
- Digital Signatures (2022) (0)
- Compressing Communication in Selection Protocols ∗ (2018) (0)
- Special Section on the Forty-Seventh Annual ACM Symposium on Theory of Computing (STOC 2015) (2018) (0)
- A Lower Bound for Adaptively-Secure Collective Coin Flipping Protocols (2020) (0)
- MIT Open Access Articles Reusable garbled circuits and succinct functional encryption (2022) (0)
- Verifiable Private Information Retrieval (2022) (0)
- Verifiable Private Information Retrieval (2022) (0)
- Smooth Projective Hashing and Two-Message Oblivious Transfer (2010) (0)
- Cryptography Against Continual Memory Leakage (2011) (0)
- Lecture 22: Voter Veriflcation in Mix-net Voting Systems (2004) (0)
- Leakage-resilient coin tossing (2014) (0)
- Proceedings - 23rd Annual IEEE Conference on Computational Complexity, CCC 2008: Preface (2008) (0)
- Theory of Cryptography (2017) (0)
- Statistical WI ( and more ) in Two Messages (2018) (0)
- Succinct Spooky Free Compilers Are Not Black Box Sound (2017) (0)
- Efficient Interactive Coding Against Adversarial Noise Zvika Brakerski (2012) (0)
- Differential Privacy 2 a Bayesian Forumulation of Differential Privacy (2011) (0)
- Message Authentication Codes (2022) (0)
- Interactive PCP 2007 (2017) (0)
- Session details: Session 3A (2010) (0)
- Session details: Session 12B (2010) (0)
- Lecture 3,4: Universal Composability (2004) (0)
- Cryptography (2019) (0)
- Hardware Security (2022) (0)
- Bounded Memory Leakage 1 Preliminaries 1.1 Notation 1.2 Leftover Hash Lemma (2011) (0)
- Answering Many Queries with Dierential Privacy (2011) (0)
- DELEGATING COMPUTATION VIA NO-SIGNALING STRATEGIES (2019) (0)
This paper list is powered by the following services:
Other Resources About Yael Tauman Kalai
What Schools Are Affiliated With Yael Tauman Kalai?
Yael Tauman Kalai is affiliated with the following schools: