BibTeX records: Joe Kilian

download as .bib file

@incollection{DBLP:books/acm/19/Ben-OrGKW19,
  author       = {Michael Ben{-}Or and
                  Shafi Goldwasser and
                  Joe Kilian and
                  Avi Wigderson},
  editor       = {Oded Goldreich},
  title        = {Multi-prover interactive proofs: how to remove intractability assumptions},
  booktitle    = {Providing Sound Foundations for Cryptography: On the Work of Shafi
                  Goldwasser and Silvio Micali},
  pages        = {373--410},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3335741.3335758},
  doi          = {10.1145/3335741.3335758},
  timestamp    = {Tue, 05 Nov 2019 15:40:16 +0100},
  biburl       = {https://dblp.org/rec/books/acm/19/Ben-OrGKW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rsa/ArratiaGK16,
  author       = {Richard Arratia and
                  Skip Garibaldi and
                  Joe Kilian},
  title        = {Asymptotic distribution for the birthday problem with multiple coincidences,
                  via an embedding of the collision process},
  journal      = {Random Struct. Algorithms},
  volume       = {48},
  number       = {3},
  pages        = {480--502},
  year         = {2016},
  url          = {https://doi.org/10.1002/rsa.20591},
  doi          = {10.1002/RSA.20591},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rsa/ArratiaGK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KellerK08,
  author       = {Jason Keller and
                  Joe Kilian},
  editor       = {Josef Pieprzyk},
  title        = {A Linked-List Approach to Cryptographically Secure Elections Using
                  Instant Runoff Voting},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Melbourne, Australia, December 7-11, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5350},
  pages        = {198--215},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89255-7\_13},
  doi          = {10.1007/978-3-540-89255-7\_13},
  timestamp    = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KellerK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/CrepeauKS08,
  author       = {Claude Cr{\'{e}}peau and
                  Joe Kilian and
                  George Savvides},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Interactive Hashing: An Information Theoretic Tool (Invited Talk)},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {14--28},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_3},
  doi          = {10.1007/978-3-540-85093-9\_3},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/CrepeauKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KilianMSZ08,
  author       = {Joe Kilian and
                  Andr{\'{e}} Madeira and
                  Martin J. Strauss and
                  Xuan Zheng},
  editor       = {Ran Canetti},
  title        = {Fast Private Norm Estimation and Heavy Hitters},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {176--193},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_11},
  doi          = {10.1007/978-3-540-78524-8\_11},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KilianMSZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cc/HarshaIKNV07,
  author       = {Prahladh Harsha and
                  Yuval Ishai and
                  Joe Kilian and
                  Kobbi Nissim and
                  Srinivasan Venkatesh},
  title        = {Communication vs. Computation},
  journal      = {Comput. Complex.},
  volume       = {16},
  number       = {1},
  pages        = {1--33},
  year         = {2007},
  url          = {https://doi.org/10.1007/s00037-007-0224-y},
  doi          = {10.1007/S00037-007-0224-Y},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cc/HarshaIKNV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotos/BaligaKI07,
  author       = {Arati Baliga and
                  Joe Kilian and
                  Liviu Iftode},
  editor       = {Galen C. Hunt},
  title        = {A Web Based Covert File System},
  booktitle    = {Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating
                  Systems, May 7-9, 2005, San Diego, California, {USA}},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {http://www.usenix.org/events/hotos07/tech/full\_papers/baliga/baliga.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotos/BaligaKI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/BaligaK07,
  author       = {Arati Baliga and
                  Joe Kilian},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {On covert collaboration},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {25--34},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288874},
  doi          = {10.1145/1288869.1288874},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/BaligaK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/combinatorica/KilianRP05,
  author       = {Joe Kilian and
                  Charles Rackoff and
                  Erez Petrank},
  title        = {Lower Bounds For Concurrent Zero Knowledge*},
  journal      = {Comb.},
  volume       = {25},
  number       = {2},
  pages        = {217--249},
  year         = {2005},
  url          = {https://doi.org/10.1007/s00493-005-0014-6},
  doi          = {10.1007/S00493-005-0014-6},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/combinatorica/KilianRP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/FortnowKPW05,
  author       = {Lance Fortnow and
                  Joe Kilian and
                  David M. Pennock and
                  Michael P. Wellman},
  title        = {Betting Boolean-style: a framework for trading in securities based
                  on logical formulas},
  journal      = {Decis. Support Syst.},
  volume       = {39},
  number       = {1},
  pages        = {87--104},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.dss.2004.08.010},
  doi          = {10.1016/J.DSS.2004.08.010},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/FortnowKPW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HarnikKNRR05,
  author       = {Danny Harnik and
                  Joe Kilian and
                  Moni Naor and
                  Omer Reingold and
                  Alon Rosen},
  editor       = {Ronald Cramer},
  title        = {On Robust Combiners for Oblivious Transfer and Other Primitives},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {96--113},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_6},
  doi          = {10.1007/11426639\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HarnikKNRR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2005,
  editor       = {Joe Kilian},
  title        = {Theory of Cryptography, Second Theory of Cryptography Conference,
                  {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3378},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b106171},
  doi          = {10.1007/B106171},
  isbn         = {3-540-24573-1},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/HarshaIKNV04,
  author       = {Prahladh Harsha and
                  Yuval Ishai and
                  Joe Kilian and
                  Kobbi Nissim and
                  Srinivasan Venkatesh},
  editor       = {Josep D{\'{\i}}az and
                  Juhani Karhum{\"{a}}ki and
                  Arto Lepist{\"{o}} and
                  Donald Sannella},
  title        = {Communication Versus Computation},
  booktitle    = {Automata, Languages and Programming: 31st International Colloquium,
                  {ICALP} 2004, Turku, Finland, July 12-16, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3142},
  pages        = {745--756},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27836-8\_63},
  doi          = {10.1007/978-3-540-27836-8\_63},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/HarshaIKNV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/ChazelleKRT04,
  author       = {Bernard Chazelle and
                  Joe Kilian and
                  Ronitt Rubinfeld and
                  Ayellet Tal},
  editor       = {J. Ian Munro},
  title        = {The Bloomier filter: an efficient data structure for static support
                  lookup tables},
  booktitle    = {Proceedings of the Fifteenth Annual {ACM-SIAM} Symposium on Discrete
                  Algorithms, {SODA} 2004, New Orleans, Louisiana, USA, January 11-14,
                  2004},
  pages        = {30--39},
  publisher    = {{SIAM}},
  year         = {2004},
  url          = {http://dl.acm.org/citation.cfm?id=982792.982797},
  timestamp    = {Fri, 07 Dec 2012 17:02:08 +0100},
  biburl       = {https://dblp.org/rec/conf/soda/ChazelleKRT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiKNP03,
  author       = {Yuval Ishai and
                  Joe Kilian and
                  Kobbi Nissim and
                  Erez Petrank},
  editor       = {Dan Boneh},
  title        = {Extending Oblivious Transfers Efficiently},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 17-21,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2729},
  pages        = {145--161},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45146-4\_9},
  doi          = {10.1007/978-3-540-45146-4\_9},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiKNP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/MicaliRK03,
  author       = {Silvio Micali and
                  Michael O. Rabin and
                  Joe Kilian},
  title        = {Zero-Knowledge Sets},
  booktitle    = {44th Symposium on Foundations of Computer Science {(FOCS} 2003), 11-14
                  October 2003, Cambridge, MA, USA, Proceedings},
  pages        = {80--91},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SFCS.2003.1238183},
  doi          = {10.1109/SFCS.2003.1238183},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/MicaliRK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/FortnowKPW03,
  author       = {Lance Fortnow and
                  Joe Kilian and
                  David M. Pennock and
                  Michael P. Wellman},
  editor       = {Daniel A. Menasc{\'{e}} and
                  Noam Nisan},
  title        = {Betting boolean-style: a framework for trading in securities based
                  on logical formulas},
  booktitle    = {Proceedings 4th {ACM} Conference on Electronic Commerce (EC-2003),
                  San Diego, California, USA, June 9-12, 2003},
  pages        = {144--155},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/779928.779946},
  doi          = {10.1145/779928.779946},
  timestamp    = {Tue, 27 Nov 2018 11:56:48 +0100},
  biburl       = {https://dblp.org/rec/conf/sigecom/FortnowKPW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BatuEKMRRS03,
  author       = {Tugkan Batu and
                  Funda Erg{\"{u}}n and
                  Joe Kilian and
                  Avner Magen and
                  Sofya Raskhodnikova and
                  Ronitt Rubinfeld and
                  Rahul Sami},
  editor       = {Lawrence L. Larmore and
                  Michel X. Goemans},
  title        = {A sublinear algorithm for weakly approximating edit distance},
  booktitle    = {Proceedings of the 35th Annual {ACM} Symposium on Theory of Computing,
                  June 9-11, 2003, San Diego, CA, {USA}},
  pages        = {316--324},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/780542.780590},
  doi          = {10.1145/780542.780590},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/BatuEKMRRS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/CowenFKK02,
  author       = {Lenore Cowen and
                  Ronald Fagin and
                  Joe Kilian and
                  Jon M. Kleinberg},
  title        = {Guest Editor's Foreword},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {65},
  number       = {1},
  pages        = {1},
  year         = {2002},
  url          = {https://doi.org/10.1006/jcss.2002.1834},
  doi          = {10.1006/JCSS.2002.1834},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/CowenFKK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/CanettiKPR02,
  author       = {Ran Canetti and
                  Joe Kilian and
                  Erez Petrank and
                  Alon Rosen},
  title        = {Black-Box Concurrent Zero-Knowledge Requires (Almost) Logarithmically
                  Many Rounds},
  journal      = {{SIAM} J. Comput.},
  volume       = {32},
  number       = {1},
  pages        = {1--47},
  year         = {2002},
  url          = {https://doi.org/10.1137/S0097539701392949},
  doi          = {10.1137/S0097539701392949},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/CanettiKPR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/FeigeK01,
  author       = {Uriel Feige and
                  Joe Kilian},
  title        = {Heuristics for Semirandom Graph Problems},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {63},
  number       = {4},
  pages        = {639--671},
  year         = {2001},
  url          = {https://doi.org/10.1006/jcss.2001.1773},
  doi          = {10.1006/JCSS.2001.1773},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/FeigeK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KilianR01,
  author       = {Joe Kilian and
                  Phillip Rogaway},
  title        = {How to Protect {DES} Against Exhaustive Key Search (an Analysis of
                  {DESX)}},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {17--35},
  year         = {2001},
  url          = {https://doi.org/10.1007/s001450010015},
  doi          = {10.1007/S001450010015},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KilianR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CohenKP01,
  author       = {Tzafrir Cohen and
                  Joe Kilian and
                  Erez Petrank},
  editor       = {Colin Boyd},
  title        = {Responsive Round Complexity and Concurrent Zero-Knowledge},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Gold Coast, Australia, December 9-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2248},
  pages        = {422--441},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45682-1\_25},
  doi          = {10.1007/3-540-45682-1\_25},
  timestamp    = {Tue, 01 Jun 2021 15:22:33 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CohenKP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/KilianP01,
  author       = {Joe Kilian and
                  Erez Petrank},
  editor       = {Jeffrey Scott Vitter and
                  Paul G. Spirakis and
                  Mihalis Yannakakis},
  title        = {Concurrent and resettable zero-knowledge in poly-loalgorithm rounds},
  booktitle    = {Proceedings on 33rd Annual {ACM} Symposium on Theory of Computing,
                  July 6-8, 2001, Heraklion, Crete, Greece},
  pages        = {560--569},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/380752.380851},
  doi          = {10.1145/380752.380851},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/KilianP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/CanettiKPR01,
  author       = {Ran Canetti and
                  Joe Kilian and
                  Erez Petrank and
                  Alon Rosen},
  editor       = {Jeffrey Scott Vitter and
                  Paul G. Spirakis and
                  Mihalis Yannakakis},
  title        = {Black-box concurrent zero-knowledge requires Omega{\textasciitilde}(log
                  n) rounds},
  booktitle    = {Proceedings on 33rd Annual {ACM} Symposium on Theory of Computing,
                  July 6-8, 2001, Heraklion, Crete, Greece},
  pages        = {570--579},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/380752.380852},
  doi          = {10.1145/380752.380852},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/CanettiKPR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2001,
  editor       = {Joe Kilian},
  title        = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 19-23,
                  2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44647-8},
  doi          = {10.1007/3-540-44647-8},
  isbn         = {3-540-42456-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CR-0107003,
  author       = {Joe Kilian and
                  Erez Petrank and
                  Charles Rackoff},
  title        = {Lower Bounds for Zero-knowledge on the Internet},
  journal      = {CoRR},
  volume       = {cs.CR/0107003},
  year         = {2001},
  url          = {https://arxiv.org/abs/cs/0107003},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CR-0107003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CR-0107004,
  author       = {Joe Kilian and
                  Erez Petrank and
                  Ransom Richardson},
  title        = {On Concurrent and Resettable Zero-Knowledge Proofs for {NP}},
  journal      = {CoRR},
  volume       = {cs.CR/0107004},
  year         = {2001},
  url          = {https://arxiv.org/abs/cs/0107004},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CR-0107004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR01-050,
  author       = {Ran Canetti and
                  Joe Kilian and
                  Erez Petrank and
                  Alon Rosen},
  title        = {Black-Box Concurrent Zero-Knowledge Requires {\textasciitilde}Omega(log
                  n) Rounds},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR01-050}},
  year         = {2001},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2001/TR01-050/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR01-050},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR01-050.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiKPR01,
  author       = {Ran Canetti and
                  Joe Kilian and
                  Erez Petrank and
                  Alon Rosen},
  title        = {Black-Box Concurrent Zero-Knowledge Requires Omega(log n) Rounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {51},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/051},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiKPR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/FeigeK00,
  author       = {Uriel Feige and
                  Joe Kilian},
  title        = {Finding {OR} in a noisy broadcast network},
  journal      = {Inf. Process. Lett.},
  volume       = {73},
  number       = {1-2},
  pages        = {69--75},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0020-0190(00)00002-8},
  doi          = {10.1016/S0020-0190(00)00002-8},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/FeigeK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/BellareKR00,
  author       = {Mihir Bellare and
                  Joe Kilian and
                  Phillip Rogaway},
  title        = {The Security of the Cipher Block Chaining Message Authentication Code},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {61},
  number       = {3},
  pages        = {362--399},
  year         = {2000},
  url          = {https://doi.org/10.1006/jcss.1999.1694},
  doi          = {10.1006/JCSS.1999.1694},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcss/BellareKR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/KilianKMO00,
  author       = {Joe Kilian and
                  Eyal Kushilevitz and
                  Silvio Micali and
                  Rafail Ostrovsky},
  title        = {Reducibility and Completeness in Private Computations},
  journal      = {{SIAM} J. Comput.},
  volume       = {29},
  number       = {4},
  pages        = {1189--1208},
  year         = {2000},
  url          = {https://doi.org/10.1137/S0097539797321742},
  doi          = {10.1137/S0097539797321742},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/KilianKMO00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/FeigeK00,
  author       = {Uriel Feige and
                  Joe Kilian},
  title        = {Two-Prover Protocols - Low Error at Affordable Rates},
  journal      = {{SIAM} J. Comput.},
  volume       = {30},
  number       = {1},
  pages        = {324--346},
  year         = {2000},
  url          = {https://doi.org/10.1137/S0097539797325375},
  doi          = {10.1137/S0097539797325375},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/FeigeK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/CachinCKM00,
  author       = {Christian Cachin and
                  Jan Camenisch and
                  Joe Kilian and
                  Joy M{\"{u}}ller},
  editor       = {Ugo Montanari and
                  Jos{\'{e}} D. P. Rolim and
                  Emo Welzl},
  title        = {One-Round Secure Computation and Secure Autonomous Mobile Agents},
  booktitle    = {Automata, Languages and Programming, 27th International Colloquium,
                  {ICALP} 2000, Geneva, Switzerland, July 9-15, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1853},
  pages        = {512--523},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45022-X\_43},
  doi          = {10.1007/3-540-45022-X\_43},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/CachinCKM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/Kilian00,
  author       = {Joe Kilian},
  editor       = {F. Frances Yao and
                  Eugene M. Luks},
  title        = {More general completeness theorems for secure two-party computation},
  booktitle    = {Proceedings of the Thirty-Second Annual {ACM} Symposium on Theory
                  of Computing, May 21-23, 2000, Portland, OR, {USA}},
  pages        = {316--324},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/335305.335342},
  doi          = {10.1145/335305.335342},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/Kilian00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KilianP00,
  author       = {Joe Kilian and
                  Erez Petrank},
  title        = {Concurrent Zero-Knowledge in Poly-logarithmic Rounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KilianP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/GoldwasserK99,
  author       = {Shafi Goldwasser and
                  Joe Kilian},
  title        = {Primality Testing Using Elliptic Curves},
  journal      = {J. {ACM}},
  volume       = {46},
  number       = {4},
  pages        = {450--472},
  year         = {1999},
  url          = {https://doi.org/10.1145/320211.320213},
  doi          = {10.1145/320211.320213},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/GoldwasserK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DamgardKS99,
  author       = {Ivan Damg{\aa}rd and
                  Joe Kilian and
                  Louis Salvail},
  editor       = {Jacques Stern},
  title        = {On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment
                  on Weakened Security Assumptions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {56--73},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_5},
  doi          = {10.1007/3-540-48910-X\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DamgardKS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ErgunKK99,
  author       = {Funda Erg{\"{u}}n and
                  Joe Kilian and
                  Ravi Kumar},
  editor       = {Jacques Stern},
  title        = {A Note on the Limits of Collusion-Resistant Watermarks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {140--149},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_10},
  doi          = {10.1007/3-540-48910-X\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ErgunKK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/RichardsonK99,
  author       = {Ransom Richardson and
                  Joe Kilian},
  editor       = {Jacques Stern},
  title        = {On the Concurrent Composition of Zero-Knowledge Proofs},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {415--431},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_29},
  doi          = {10.1007/3-540-48910-X\_29},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/RichardsonK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/FeigeK98,
  author       = {Uriel Feige and
                  Joe Kilian},
  title        = {Zero Knowledge and the Chromatic Number},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {57},
  number       = {2},
  pages        = {187--199},
  year         = {1998},
  url          = {https://doi.org/10.1006/jcss.1998.1587},
  doi          = {10.1006/JCSS.1998.1587},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/FeigeK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KilianP98,
  author       = {Joe Kilian and
                  Erez Petrank},
  title        = {An Efficient Noninteractive Zero-Knowledge Proof System for {NP} with
                  General Assumptions},
  journal      = {J. Cryptol.},
  volume       = {11},
  number       = {1},
  pages        = {1--27},
  year         = {1998},
  url          = {https://doi.org/10.1007/s001459900032},
  doi          = {10.1007/S001459900032},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KilianP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KilianP98,
  author       = {Joe Kilian and
                  Erez Petrank},
  editor       = {Hugo Krawczyk},
  title        = {Identity Escrow},
  booktitle    = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1462},
  pages        = {169--185},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055727},
  doi          = {10.1007/BFB0055727},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KilianP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/KilianPR98,
  author       = {Joe Kilian and
                  Erez Petrank and
                  Charles Rackoff},
  title        = {Lower Bounds for Zero Knowledge on the Internet},
  booktitle    = {39th Annual Symposium on Foundations of Computer Science, {FOCS} '98,
                  November 8-11, 1998, Palo Alto, California, {USA}},
  pages        = {484--492},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/SFCS.1998.743499},
  doi          = {10.1109/SFCS.1998.743499},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/KilianPR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/FeigeK98,
  author       = {Uriel Feige and
                  Joe Kilian},
  title        = {Heuristics for Finding Large Independent Sets, with Applications to
                  Coloring Semi-Random Graphs},
  booktitle    = {39th Annual Symposium on Foundations of Computer Science, {FOCS} '98,
                  November 8-11, 1998, Palo Alto, California, {USA}},
  pages        = {674--683},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/SFCS.1998.743518},
  doi          = {10.1109/SFCS.1998.743518},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/FeigeK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cjtcs/FeigeK97,
  author       = {Uriel Feige and
                  Joe Kilian},
  title        = {On Limited versus Polynomial Nondeterminism},
  journal      = {Chic. J. Theor. Comput. Sci.},
  volume       = {1997},
  year         = {1997},
  url          = {http://cjtcs.cs.uchicago.edu/articles/1997/1/contents.html},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cjtcs/FeigeK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BeaverFKR97,
  author       = {Donald Beaver and
                  Joan Feigenbaum and
                  Joe Kilian and
                  Phillip Rogaway},
  title        = {Locally Random Reductions: Improvements and Applications},
  journal      = {J. Cryptol.},
  volume       = {10},
  number       = {1},
  pages        = {17--36},
  year         = {1997},
  url          = {https://doi.org/10.1007/s001459900017},
  doi          = {10.1007/S001459900017},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BeaverFKR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tip/CoxKLS97,
  author       = {Ingemar J. Cox and
                  Joe Kilian and
                  Frank Thomson Leighton and
                  Talal Shamoon},
  title        = {Secure spread spectrum watermarking for multimedia},
  journal      = {{IEEE} Trans. Image Process.},
  volume       = {6},
  number       = {12},
  pages        = {1673--1687},
  year         = {1997},
  url          = {https://doi.org/10.1109/83.650120},
  doi          = {10.1109/83.650120},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tip/CoxKLS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/KilianPT97,
  author       = {Joe Kilian and
                  Erez Petrank and
                  G{\'{a}}bor Tardos},
  editor       = {Frank Thomson Leighton and
                  Peter W. Shor},
  title        = {Probabilistically Checkable Proofs with Zero Knowledge},
  booktitle    = {Proceedings of the Twenty-Ninth Annual {ACM} Symposium on the Theory
                  of Computing, El Paso, Texas, USA, May 4-6, 1997},
  pages        = {496--505},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/258533.258643},
  doi          = {10.1145/258533.258643},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/KilianPT97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/FeigeK97,
  author       = {Uriel Feige and
                  Joe Kilian},
  editor       = {Frank Thomson Leighton and
                  Peter W. Shor},
  title        = {Making Games Short (Extended Abstract)},
  booktitle    = {Proceedings of the Twenty-Ninth Annual {ACM} Symposium on the Theory
                  of Computing, El Paso, Texas, USA, May 4-6, 1997},
  pages        = {506--516},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/258533.258644},
  doi          = {10.1145/258533.258644},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/FeigeK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KilianP97,
  author       = {Joe Kilian and
                  Erez Petrank},
  title        = {Identity Escrow},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {1997},
  url          = {http://eprint.iacr.org/1997/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KilianP97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/KilianS96,
  author       = {Joe Kilian and
                  Hava T. Siegelmann},
  title        = {The Dynamic Universality of Sigmoidal Neural Networks},
  journal      = {Inf. Comput.},
  volume       = {128},
  number       = {1},
  pages        = {48--56},
  year         = {1996},
  url          = {https://doi.org/10.1006/inco.1996.0062},
  doi          = {10.1006/INCO.1996.0062},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/KilianS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coco/FeigeK96,
  author       = {Uriel Feige and
                  Joe Kilian},
  editor       = {Steven Homer and
                  Jin{-}Yi Cai},
  title        = {Zero Knowledge and the Chromatic Number},
  booktitle    = {Proceedings of the Eleveth Annual {IEEE} Conference on Computational
                  Complexity, Philadelphia, Pennsylvania, USA, May 24-27, 1996},
  pages        = {278--287},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CCC.1996.507690},
  doi          = {10.1109/CCC.1996.507690},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coco/FeigeK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KilianR96,
  author       = {Joe Kilian and
                  Phillip Rogaway},
  editor       = {Neal Koblitz},
  title        = {How to Protect {DES} Against Exhaustive Key Search},
  booktitle    = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1109},
  pages        = {252--267},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68697-5\_20},
  doi          = {10.1007/3-540-68697-5\_20},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KilianR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/CoxKLS96,
  author       = {Ingemar J. Cox and
                  Joe Kilian and
                  Tom Leighton and
                  Talal Shamoon},
  title        = {Secure spread spectrum watermarking for images, audio and video},
  booktitle    = {Proceedings 1996 International Conference on Image Processing, Lausanne,
                  Switzerland, September 16-19, 1996},
  pages        = {243--246},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/ICIP.1996.560429},
  doi          = {10.1109/ICIP.1996.560429},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icip/CoxKLS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/CoxKLS96,
  author       = {Ingemar J. Cox and
                  Joe Kilian and
                  Frank Thomson Leighton and
                  Talal Shamoon},
  editor       = {Ross J. Anderson},
  title        = {A Secure, Robust Watermark for Multimedia},
  booktitle    = {Information Hiding, First International Workshop, Cambridge, UK, May
                  30 - June 1, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1174},
  pages        = {185--206},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61996-8\_41},
  doi          = {10.1007/3-540-61996-8\_41},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/CoxKLS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KilianL95,
  author       = {Joe Kilian and
                  Frank Thomson Leighton},
  editor       = {Don Coppersmith},
  title        = {Fair Cryptosystems, Revisited: {A} Rigorous Approach to Key-Escrow
                  (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {963},
  pages        = {208--221},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-44750-4\_17},
  doi          = {10.1007/3-540-44750-4\_17},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KilianL95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Kilian95,
  author       = {Joe Kilian},
  editor       = {Don Coppersmith},
  title        = {Improved Efficient Arguments (Preliminary Version)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {963},
  pages        = {311--324},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-44750-4\_25},
  doi          = {10.1007/3-540-44750-4\_25},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Kilian95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/SakoK95,
  author       = {Kazue Sako and
                  Joe Kilian},
  editor       = {Louis C. Guillou and
                  Jean{-}Jacques Quisquater},
  title        = {Receipt-Free Mix-Type Voting Scheme - {A} Practical Solution to the
                  Implementation of a Voting Booth},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '95, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saint-Malo,
                  France, May 21-25, 1995, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {921},
  pages        = {393--403},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-49264-X\_32},
  doi          = {10.1007/3-540-49264-X\_32},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/SakoK95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/istcs/BellareFK95,
  author       = {Mihir Bellare and
                  Uriel Feige and
                  Joe Kilian},
  title        = {On the Role of Shared Randomness in Two Prover Proof Systems},
  booktitle    = {Third Israel Symposium on Theory of Computing and Systems, {ISTCS}
                  1995, Tel Aviv, Israel, January 4-6, 1995, Proceedings},
  pages        = {199--208},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/ISTCS.1995.377031},
  doi          = {10.1109/ISTCS.1995.377031},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/istcs/BellareFK95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/istcs/KilianN95,
  author       = {Joe Kilian and
                  Moni Naor},
  title        = {On the Complexity of Statistical Reasoning (extended abtract)},
  booktitle    = {Third Israel Symposium on Theory of Computing and Systems, {ISTCS}
                  1995, Tel Aviv, Israel, January 4-6, 1995, Proceedings},
  pages        = {209--217},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/ISTCS.1995.377030},
  doi          = {10.1109/ISTCS.1995.377030},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/istcs/KilianN95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/FeigeK95,
  author       = {Uriel Feige and
                  Joe Kilian},
  editor       = {Frank Thomson Leighton and
                  Allan Borodin},
  title        = {Impossibility results for recycling random bits in two-prover proof
                  systems},
  booktitle    = {Proceedings of the Twenty-Seventh Annual {ACM} Symposium on Theory
                  of Computing, 29 May-1 June 1995, Las Vegas, Nevada, {USA}},
  pages        = {457--468},
  publisher    = {{ACM}},
  year         = {1995},
  url          = {https://doi.org/10.1145/225058.225183},
  doi          = {10.1145/225058.225183},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/FeigeK95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR95-038,
  author       = {Joe Kilian and
                  Erez Petrank},
  title        = {An Efficient Non-Interactive Zero-Knowledge Proof System for {NP}
                  with General Assumptions},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR95-038}},
  year         = {1995},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/1995/TR95-038/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR95-038},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR95-038.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colt/KilianLP94,
  author       = {Joe Kilian and
                  Kevin J. Lang and
                  Barak A. Pearlmutter},
  editor       = {Manfred K. Warmuth},
  title        = {Playing the Matching-Shoulders Lob-Pass Game with Logarithmic Regret},
  booktitle    = {Proceedings of the Seventh Annual {ACM} Conference on Computational
                  Learning Theory, {COLT} 1994, New Brunswick, NJ, USA, July 12-15,
                  1994},
  pages        = {159--164},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/180139.181094},
  doi          = {10.1145/180139.181094},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/colt/KilianLP94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareKR94,
  author       = {Mihir Bellare and
                  Joe Kilian and
                  Phillip Rogaway},
  editor       = {Yvo Desmedt},
  title        = {The Security of Cipher Block Chaining},
  booktitle    = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {839},
  pages        = {341--358},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-48658-5\_32},
  doi          = {10.1007/3-540-48658-5\_32},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareKR94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SakoK94,
  author       = {Kazue Sako and
                  Joe Kilian},
  editor       = {Yvo Desmedt},
  title        = {Secure Voting Using Partially Compatible Homomorphisms},
  booktitle    = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {839},
  pages        = {411--424},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-48658-5\_37},
  doi          = {10.1007/3-540-48658-5\_37},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/SakoK94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/Kilian94,
  author       = {Joe Kilian},
  title        = {On the complexity of Bounded-Interaction and Noninteractive Zero-Knowledge
                  Proofs},
  booktitle    = {35th Annual Symposium on Foundations of Computer Science, Santa Fe,
                  New Mexico, USA, 20-22 November 1994},
  pages        = {466--477},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/SFCS.1994.365744},
  doi          = {10.1109/SFCS.1994.365744},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/Kilian94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/FeigeK94,
  author       = {Uriel Feige and
                  Joe Kilian},
  editor       = {Frank Thomson Leighton and
                  Michael T. Goodrich},
  title        = {Two prover protocols: low error at affordable rates},
  booktitle    = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Theory of
                  Computing, 23-25 May 1994, Montr{\'{e}}al, Qu{\'{e}}bec,
                  Canada},
  pages        = {172--183},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/195058.195128},
  doi          = {10.1145/195058.195128},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/FeigeK94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/FeigeKN94,
  author       = {Uriel Feige and
                  Joe Kilian and
                  Moni Naor},
  editor       = {Frank Thomson Leighton and
                  Michael T. Goodrich},
  title        = {A minimal model for secure computation (extended abstract)},
  booktitle    = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Theory of
                  Computing, 23-25 May 1994, Montr{\'{e}}al, Qu{\'{e}}bec,
                  Canada},
  pages        = {554--563},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/195058.195408},
  doi          = {10.1145/195058.195408},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/FeigeKN94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colt/KilianS93,
  author       = {Joe Kilian and
                  Hava T. Siegelmann},
  editor       = {Lenny Pitt},
  title        = {On the Power of Sigmoid Neural Networks},
  booktitle    = {Proceedings of the Sixth Annual {ACM} Conference on Computational
                  Learning Theory, {COLT} 1993, Santa Cruz, CA, USA, July 26-28, 1993},
  pages        = {137--143},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/168304.168321},
  doi          = {10.1145/168304.168321},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/colt/KilianS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CrepeauK93,
  author       = {Claude Cr{\'{e}}peau and
                  Joe Kilian},
  editor       = {Douglas R. Stinson},
  title        = {Discreet Solitary Games},
  booktitle    = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {773},
  pages        = {319--330},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48329-2\_27},
  doi          = {10.1007/3-540-48329-2\_27},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CrepeauK93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DworkFKNS92,
  author       = {Cynthia Dwork and
                  Uriel Feige and
                  Joe Kilian and
                  Moni Naor and
                  Shmuel Safra},
  editor       = {Ernest F. Brickell},
  title        = {Low Communication 2-Prover Zero-Knowledge Proofs for {NP}},
  booktitle    = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {740},
  pages        = {215--227},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-48071-4\_15},
  doi          = {10.1007/3-540-48071-4\_15},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DworkFKNS92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/Kilian92,
  author       = {Joe Kilian},
  editor       = {S. Rao Kosaraju and
                  Mike Fellows and
                  Avi Wigderson and
                  John A. Ellis},
  title        = {A Note on Efficient Zero-Knowledge Proofs and Arguments (Extended
                  Abstract)},
  booktitle    = {Proceedings of the 24th Annual {ACM} Symposium on Theory of Computing,
                  May 4-6, 1992, Victoria, British Columbia, Canada},
  pages        = {723--732},
  publisher    = {{ACM}},
  year         = {1992},
  url          = {https://doi.org/10.1145/129712.129782},
  doi          = {10.1145/129712.129782},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/Kilian92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KilianR91,
  author       = {Joe Kilian and
                  Ronitt Rubinfeld},
  editor       = {Joan Feigenbaum},
  title        = {Interactive Proofs with Space Bounded Provers},
  booktitle    = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {576},
  pages        = {225--231},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46766-1\_17},
  doi          = {10.1007/3-540-46766-1\_17},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KilianR91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/Kilian91,
  author       = {Joe Kilian},
  editor       = {Cris Koutsougeras and
                  Jeffrey Scott Vitter},
  title        = {A General Completeness Theorem for Two-Party Games},
  booktitle    = {Proceedings of the 23rd Annual {ACM} Symposium on Theory of Computing,
                  May 5-8, 1991, New Orleans, Louisiana, {USA}},
  pages        = {553--560},
  publisher    = {{ACM}},
  year         = {1991},
  url          = {https://doi.org/10.1145/103418.103475},
  doi          = {10.1145/103418.103475},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/Kilian91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0066918,
  author       = {Joe Kilian},
  title        = {Uses of randomness in algorithms and protocols},
  publisher    = {{MIT} Press},
  year         = {1990},
  isbn         = {978-0-262-11153-9},
  timestamp    = {Thu, 05 May 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0066918.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/KilianKL90,
  author       = {Joe Kilian and
                  Shlomo Kipnis and
                  Charles E. Leiserson},
  title        = {The Organization of Permutation Architectures with Bused Interconnections},
  journal      = {{IEEE} Trans. Computers},
  volume       = {39},
  number       = {11},
  pages        = {1346--1358},
  year         = {1990},
  url          = {https://doi.org/10.1109/12.61044},
  doi          = {10.1109/12.61044},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/KilianKL90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeaverFKR90,
  author       = {Donald Beaver and
                  Joan Feigenbaum and
                  Joe Kilian and
                  Phillip Rogaway},
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {Security with Low Communication Overhead},
  booktitle    = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  pages        = {62--76},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-38424-3\_5},
  doi          = {10.1007/3-540-38424-3\_5},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BeaverFKR90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Kilian90,
  author       = {Joe Kilian},
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {Achieving Zero-Knowledge Robustly},
  booktitle    = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  pages        = {313--325},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-38424-3\_23},
  doi          = {10.1007/3-540-38424-3\_23},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Kilian90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Kilian90a,
  author       = {Joe Kilian},
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {Interactive Proofs with Provable Security Against Honest Verifiers},
  booktitle    = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  pages        = {378--392},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-38424-3\_28},
  doi          = {10.1007/3-540-38424-3\_28},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Kilian90a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/AbadiFK89,
  author       = {Mart{\'{\i}}n Abadi and
                  Joan Feigenbaum and
                  Joe Kilian},
  title        = {On Hiding Information from an Oracle},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {39},
  number       = {1},
  pages        = {21--50},
  year         = {1989},
  url          = {https://doi.org/10.1016/0022-0000(89)90018-4},
  doi          = {10.1016/0022-0000(89)90018-4},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/AbadiFK89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Ben-OrGKW89,
  author       = {Michael Ben{-}Or and
                  Shafi Goldwasser and
                  Joe Kilian and
                  Avi Wigderson},
  editor       = {Gilles Brassard},
  title        = {Efficient Identification Schemes Using Two Prover Interactive Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {498--506},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_44},
  doi          = {10.1007/0-387-34805-0\_44},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Ben-OrGKW89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KilianO89,
  author       = {Joe Kilian and
                  Silvio Micali and
                  Rafail Ostrovsky},
  editor       = {Gilles Brassard},
  title        = {Minimum Resource Zero-Knowledge Proofs (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {545--546},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_47},
  doi          = {10.1007/0-387-34805-0\_47},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KilianO89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/KilianMO89,
  author       = {Joe Kilian and
                  Silvio Micali and
                  Rafail Ostrovsky},
  title        = {Minimum Resource Zero-Knowledge Proofs (Extended Abstract)},
  booktitle    = {30th Annual Symposium on Foundations of Computer Science, Research
                  Triangle Park, North Carolina, USA, 30 October - 1 November 1989},
  pages        = {474--479},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/SFCS.1989.63521},
  doi          = {10.1109/SFCS.1989.63521},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/KilianMO89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CrepeauK88,
  author       = {Claude Cr{\'{e}}peau and
                  Joe Kilian},
  editor       = {Shafi Goldwasser},
  title        = {Weakening Security Assumptions and Oblivious Transfer (Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {2--7},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_1},
  doi          = {10.1007/0-387-34799-2\_1},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CrepeauK88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Ben-OrGGHKMR88,
  author       = {Michael Ben{-}Or and
                  Oded Goldreich and
                  Shafi Goldwasser and
                  Johan H{\aa}stad and
                  Joe Kilian and
                  Silvio Micali and
                  Phillip Rogaway},
  editor       = {Shafi Goldwasser},
  title        = {Everything Provable is Provable in Zero-Knowledge},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {37--56},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_4},
  doi          = {10.1007/0-387-34799-2\_4},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Ben-OrGGHKMR88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/Kilian88,
  author       = {Joe Kilian},
  title        = {Zero-knowledge with Log-Space Verifiers},
  booktitle    = {29th Annual Symposium on Foundations of Computer Science, White Plains,
                  New York, USA, 24-26 October 1988},
  pages        = {25--35},
  publisher    = {{IEEE} Computer Society},
  year         = {1988},
  url          = {https://doi.org/10.1109/SFCS.1988.21918},
  doi          = {10.1109/SFCS.1988.21918},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/Kilian88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/CrepeauK88,
  author       = {Claude Cr{\'{e}}peau and
                  Joe Kilian},
  title        = {Achieving Oblivious Transfer Using Weakened Security Assumptions (Extended
                  Abstract)},
  booktitle    = {29th Annual Symposium on Foundations of Computer Science, White Plains,
                  New York, USA, 24-26 October 1988},
  pages        = {42--52},
  publisher    = {{IEEE} Computer Society},
  year         = {1988},
  url          = {https://doi.org/10.1109/SFCS.1988.21920},
  doi          = {10.1109/SFCS.1988.21920},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/CrepeauK88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/Kilian88,
  author       = {Joe Kilian},
  editor       = {Janos Simon},
  title        = {Founding Cryptography on Oblivious Transfer},
  booktitle    = {Proceedings of the 20th Annual {ACM} Symposium on Theory of Computing,
                  May 2-4, 1988, Chicago, Illinois, {USA}},
  pages        = {20--31},
  publisher    = {{ACM}},
  year         = {1988},
  url          = {https://doi.org/10.1145/62212.62215},
  doi          = {10.1145/62212.62215},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/Kilian88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/Ben-OrGKW88,
  author       = {Michael Ben{-}Or and
                  Shafi Goldwasser and
                  Joe Kilian and
                  Avi Wigderson},
  editor       = {Janos Simon},
  title        = {Multi-Prover Interactive Proofs: How to Remove Intractability Assumptions},
  booktitle    = {Proceedings of the 20th Annual {ACM} Symposium on Theory of Computing,
                  May 2-4, 1988, Chicago, Illinois, {USA}},
  pages        = {113--131},
  publisher    = {{ACM}},
  year         = {1988},
  url          = {https://doi.org/10.1145/62212.62223},
  doi          = {10.1145/62212.62223},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/Ben-OrGKW88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coco/AbadiFK87,
  author       = {Mart{\'{\i}}n Abadi and
                  Joan Feigenbaum and
                  Joe Kilian},
  title        = {On hiding information from an oracle},
  booktitle    = {Proceedings of the Second Annual Conference on Structure in Complexity
                  Theory, Cornell University, Ithaca, New York, USA, June 16-19, 1987},
  pages        = {9},
  publisher    = {{IEEE} Computer Society},
  year         = {1987},
  url          = {https://ieeexplore.ieee.org/document/10319247},
  timestamp    = {Tue, 21 Nov 2023 11:59:25 +0100},
  biburl       = {https://dblp.org/rec/conf/coco/AbadiFK87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/KilianKL87,
  author       = {Joe Kilian and
                  Shlomo Kipnis and
                  Charles E. Leiserson},
  title        = {The Organization of Permutation Architectures with Bussed Interconnections
                  (Extended Abstract)},
  booktitle    = {28th Annual Symposium on Foundations of Computer Science, Los Angeles,
                  California, USA, 27-29 October 1987},
  pages        = {305--315},
  publisher    = {{IEEE} Computer Society},
  year         = {1987},
  url          = {https://doi.org/10.1109/SFCS.1987.58},
  doi          = {10.1109/SFCS.1987.58},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/KilianKL87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/AbadiFK87,
  author       = {Mart{\'{\i}}n Abadi and
                  Joan Feigenbaum and
                  Joe Kilian},
  editor       = {Alfred V. Aho},
  title        = {On Hiding Information from an Oracle (Extended Abstract)},
  booktitle    = {Proceedings of the 19th Annual {ACM} Symposium on Theory of Computing,
                  1987, New York, New York, {USA}},
  pages        = {195--203},
  publisher    = {{ACM}},
  year         = {1987},
  url          = {https://doi.org/10.1145/28395.28417},
  doi          = {10.1145/28395.28417},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/AbadiFK87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GoldwasserK86,
  author       = {Shafi Goldwasser and
                  Joe Kilian},
  editor       = {Juris Hartmanis},
  title        = {Almost All Primes Can Be Quickly Certified},
  booktitle    = {Proceedings of the 18th Annual {ACM} Symposium on Theory of Computing,
                  May 28-30, 1986, Berkeley, California, {USA}},
  pages        = {316--329},
  publisher    = {{ACM}},
  year         = {1986},
  url          = {https://doi.org/10.1145/12130.12162},
  doi          = {10.1145/12130.12162},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GoldwasserK86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics