关注
Rafael Pass
Rafael Pass
Tel-Aviv University, Cornell Tech
在 cs.cornell.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Analysis of the blockchain protocol in asynchronous networks
R Pass, L Seeman, A Shelat
Annual international conference on the theory and applications of …, 2017
8522017
Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake
P Daian, R Pass, E Shi
Financial Cryptography and Data Security: 23rd International Conference, FC …, 2019
512*2019
Universally composable security with global setup
R Canetti, Y Dodis, R Pass, S Walfish
Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007 …, 2007
4752007
Hybrid consensus: Efficient consensus in the permissionless model
R Pass, E Shi
Cryptology ePrint Archive, 2016
4642016
Fruitchains: A fair blockchain
R Pass, E Shi
Proceedings of the ACM symposium on principles of distributed computing, 315-324, 2017
4392017
Thunderella: Blockchains with Optimistic Instant Confirmation
R Pass, E Shi
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
3052018
Universally composable protocols with relaxed set-up assumptions
B Barak, R Canetti, JB Nielsen, R Pass
45th Annual IEEE Symposium on Foundations of Computer Science, 186-195, 2004
2552004
On deniability in the common reference string and random oracle model
R Pass
Advances in Cryptology-CRYPTO 2003: 23rd Annual International Cryptology …, 2003
2502003
On extractability obfuscation
E Boyle, KM Chung, R Pass
Theory of cryptography conference, 52-73, 2014
2252014
The sleepy model of consensus
R Pass, E Shi
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
2162017
Simulation in quasi-polynomial time, and its application to protocol composition
R Pass
International Conference on the Theory and Applications of Cryptographic …, 2003
2162003
Indistinguishability obfuscation from semantically-secure multilinear encodings
R Pass, K Seth, S Telang
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
2062014
Bounded-concurrent secure multi-party computation with a dishonest majority
R Pass
Proceedings of the thirty-sixth annual ACM symposium on Theory of computing …, 2004
1992004
New and improved constructions of non-malleable cryptographic protocols
R Pass, A Rosen
Proceedings of the thirty-seventh annual ACM symposium on Theory of …, 2005
1982005
Algorithmic rationality: Game theory with costly computation
JY Halpern, R Pass
Journal of Economic Theory 156, 246-268, 2015
196*2015
Concurrent nonmalleable commitments
R Pass, A Rosen
SIAM Journal on Computing 37 (6), 1891-1925, 2008
1782008
Towards privacy for social networks: A zero-knowledge based definition of privacy
J Gehrke, E Lui, R Pass
Theory of cryptography conference, 432-449, 2011
1722011
Secure computation without authentication
B Barak, R Canetti, Y Lindell, R Pass, T Rabin
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
161*2005
Succinct randomized encodings and their applications
N Bitansky, S Garg, H Lin, R Pass, S Telang
Proceedings of the forty-seventh annual ACM symposium on Theory of Computing …, 2015
1452015
Formal abstractions for attested execution secure processors
R Pass, E Shi, F Tramer
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
1382017
系统目前无法执行此操作,请稍后再试。
文章 1–20