default search action
Abhi Shelat
Person information
- affiliation: Northeastern University, Khoury College of Computer Sciences, Boston, MA, USA
- affiliation: University of Virginia, Charlottesville, VA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c69]Ran Cohen, Jack Doerner, Yashvanth Kondi, Abhi Shelat:
Secure Multiparty Computation with Identifiable Abort via Vindicating Release. CRYPTO (8) 2024: 36-73 - [c68]Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat:
Threshold ECDSA in Three Rounds. SP 2024: 3053-3071 - [i40]Schuyler Rosefield, Abhi Shelat, LaKyah Tyner:
Threshold Garbled Circuits with Low Overhead. IACR Cryptol. ePrint Arch. 2024: 316 (2024) - 2023
- [j9]Ran Cohen, Abhi Shelat, Daniel Wichs:
Adaptively Secure MPC with Sublinear Communication Complexity. J. Cryptol. 36(2): 11 (2023) - [c67]Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat, LaKyah Tyner:
Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance. SP 2023: 773-789 - [i39]Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat, LaKyah Tyner:
Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance. IACR Cryptol. ePrint Arch. 2023: 602 (2023) - [i38]Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat:
Threshold ECDSA in Three Rounds. IACR Cryptol. ePrint Arch. 2023: 765 (2023) - [i37]Ran Cohen, Jack Doerner, Yashvanth Kondi, Abhi Shelat:
Secure Multiparty Computation with Identifiable Abort from Vindicating Release. IACR Cryptol. ePrint Arch. 2023: 1136 (2023) - 2022
- [j8]Megan Chen, Jack Doerner, Yashvanth Kondi, Eysa Lee, Schuyler Rosefield, Abhi Shelat, Ran Cohen:
Multiparty Generation of an RSA Modulus. J. Cryptol. 35(2): 12 (2022) - [c66]Yashvanth Kondi, Abhi Shelat:
Improved Straight-Line Extraction in the Random Oracle Model with Applications to Signature Aggregation. ASIACRYPT (2) 2022: 279-309 - [c65]Ran Cohen, Jack Doerner, Yashvanth Kondi, Abhi Shelat:
Guaranteed Output in $O(\sqrt{n})$ Rounds for Round-Robin Sampling Protocols. EUROCRYPT (1) 2022: 241-271 - [i36]Ran Cohen, Jack Doerner, Yashvanth Kondi, Abhi Shelat:
Guaranteed Output in $O(\sqrt{n})$ Rounds for Round-Robin Sampling Protocols. IACR Cryptol. ePrint Arch. 2022: 257 (2022) - [i35]Yashvanth Kondi, Abhi Shelat:
Improved Straight-Line Extraction in the Random Oracle Model With Applications to Signature Aggregation. IACR Cryptol. ePrint Arch. 2022: 393 (2022) - [i34]Lucianna Kiffer, Rajmohan Rajaraman, Abhi Shelat:
A Better Method to Analyze Blockchain Consistency. IACR Cryptol. ePrint Arch. 2022: 601 (2022) - 2021
- [c64]Megan Chen, Carmit Hazay, Yuval Ishai, Yuriy Kashnikov, Daniele Micciancio, Tarik Riviere, Abhi Shelat, Muthuramakrishnan Venkitasubramaniam, Ruihan Wang:
Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority. SP 2021: 590-607 - 2020
- [c63]Megan Chen, Ran Cohen, Jack Doerner, Yashvanth Kondi, Eysa Lee, Schuyler Rosefield, Abhi Shelat:
Multiparty Generation of an RSA Modulus. CRYPTO (3) 2020: 64-93 - [c62]Carmit Hazay, Abhi Shelat, Muthuramakrishnan Venkitasubramaniam:
Going Beyond Dual Execution: MPC for Functions with Efficient Verification. Public Key Cryptography (2) 2020: 328-356 - [i33]Carmit Hazay, Abhi Shelat, Muthuramakrishnan Venkitasubramaniam:
Going Beyond Dual Execution: MPC for Functions with Efficient Verification. IACR Cryptol. ePrint Arch. 2020: 139 (2020) - [i32]Megan Chen, Ran Cohen, Jack Doerner, Yashvanth Kondi, Eysa Lee, Schuyler Rosefield, Abhi Shelat:
Multiparty Generation of an RSA Modulus. IACR Cryptol. ePrint Arch. 2020: 370 (2020) - [i31]Megan Chen, Carmit Hazay, Yuval Ishai, Yuriy Kashnikov, Daniele Micciancio, Tarik Riviere, Abhi Shelat, Muthuramakrishnan Venkitasubramaniam, Ruihan Wang:
Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority. IACR Cryptol. ePrint Arch. 2020: 374 (2020)
2010 – 2019
- 2019
- [c61]Jeffrey Champion, Abhi Shelat, Jonathan R. Ullman:
Securely Sampling Biased Coins with Applications to Differential Privacy. CCS 2019: 603-614 - [c60]Ran Cohen, Abhi Shelat, Daniel Wichs:
Adaptively Secure MPC with Sublinear Communication Complexity. CRYPTO (2) 2019: 30-60 - [c59]Antonio Marcedone, Rafael Pass, Abhi Shelat:
Minimizing Trust in Hardware Wallets with Two Factor Signatures. Financial Cryptography 2019: 407-425 - [c58]Liang Wang, Gilad Asharov, Rafael Pass, Thomas Ristenpart, Abhi Shelat:
Blind Certificate Authorities. IEEE Symposium on Security and Privacy 2019: 1015-1032 - [c57]Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat:
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case. IEEE Symposium on Security and Privacy 2019: 1051-1066 - [i30]Antonio Marcedone, Rafael Pass, Abhi Shelat:
Minimizing Trust in Hardware Wallets with Two Factor Signatures. IACR Cryptol. ePrint Arch. 2019: 6 (2019) - [i29]Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat:
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case. IACR Cryptol. ePrint Arch. 2019: 523 (2019) - [i28]Jeffrey Champion, Abhi Shelat, Jonathan R. Ullman:
Securely Sampling Biased Coins with Applications to Differential Privacy. IACR Cryptol. ePrint Arch. 2019: 823 (2019) - 2018
- [c56]Lucianna Kiffer, Rajmohan Rajaraman, Abhi Shelat:
A Better Method to Analyze Blockchain Consistency. CCS 2018: 729-744 - [c55]Ariel Hamlin, Abhi Shelat, Mor Weiss, Daniel Wichs:
Multi-Key Searchable Encryption, Revisited. Public Key Cryptography (1) 2018: 95-124 - [c54]Riad S. Wahby, Ioanna Tzialla, Abhi Shelat, Justin Thaler, Michael Walfish:
Doubly-Efficient zkSNARKs Without Trusted Setup. IEEE Symposium on Security and Privacy 2018: 926-943 - [c53]Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat:
Secure Two-party Threshold ECDSA from ECDSA Assumptions. IEEE Symposium on Security and Privacy 2018: 980-997 - [i27]Ariel Hamlin, Abhi Shelat, Mor Weiss, Daniel Wichs:
Multi-Key Searchable Encryption, Revisited. IACR Cryptol. ePrint Arch. 2018: 18 (2018) - [i26]Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat:
Secure Two-party Threshold ECDSA from ECDSA Assumptions. IACR Cryptol. ePrint Arch. 2018: 499 (2018) - [i25]Liang Wang, Gilad Asharov, Rafael Pass, Thomas Ristenpart, Abhi Shelat:
Blind Certificate Authorities. IACR Cryptol. ePrint Arch. 2018: 1022 (2018) - [i24]Ran Cohen, Abhi Shelat, Daniel Wichs:
Adaptively Secure MPC with Sublinear Communication Complexity. IACR Cryptol. ePrint Arch. 2018: 1161 (2018) - 2017
- [c52]Jack Doerner, Abhi Shelat:
Scaling ORAM for Secure Computation. CCS 2017: 523-535 - [c51]Riad S. Wahby, Ye Ji, Andrew J. Blumberg, Abhi Shelat, Justin Thaler, Michael Walfish, Thomas Wies:
Full Accounting for Verifiable Outsourcing. CCS 2017: 2071-2086 - [c50]Rafael Pass, Lior Seeman, Abhi Shelat:
Analysis of the Blockchain Protocol in Asynchronous Networks. EUROCRYPT (2) 2017: 643-673 - [c49]Ben Fisch, Rafael Pass, Abhi Shelat:
Socially Optimal Mining Pools. WINE 2017: 205-218 - [i23]Ben A. Fisch, Rafael Pass, Abhi Shelat:
Socially Optimal Mining Pools. CoRR abs/1703.03846 (2017) - [i22]Riad S. Wahby, Ye Ji, Andrew J. Blumberg, Abhi Shelat, Justin Thaler, Michael Walfish, Thomas Wies:
Full accounting for verifiable outsourcing. IACR Cryptol. ePrint Arch. 2017: 242 (2017) - [i21]Jack Doerner, Abhi Shelat:
Scaling ORAM for Secure Computation. IACR Cryptol. ePrint Arch. 2017: 827 (2017) - [i20]Riad S. Wahby, Ioanna Tzialla, Abhi Shelat, Justin Thaler, Michael Walfish:
Doubly-efficient zkSNARKs without trusted setup. IACR Cryptol. ePrint Arch. 2017: 1132 (2017) - 2016
- [c48]Jack Doerner, David Evans, Abhi Shelat:
Secure Stable Matching at Scale. CCS 2016: 1602-1613 - [c47]Antonio Marcedone, Rafael Pass, Abhi Shelat:
Bounded KDM Security from iO and OWF. SCN 2016: 571-586 - [c46]Riad S. Wahby, Max Howald, Siddharth Garg, Abhi Shelat, Michael Walfish:
Verifiable ASICs. IEEE Symposium on Security and Privacy 2016: 759-778 - [c45]Rafael Pass, Abhi Shelat:
Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings. TCC (A1) 2016: 3-17 - [c44]Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji, Rafael Pass, Abhi Shelat:
Lower Bounds on Assumptions Behind Indistinguishability Obfuscation. TCC (A1) 2016: 49-66 - [c43]Ruiyu Zhu, Yan Huang, Jonathan Katz, Abhi Shelat:
The Cut-and-Choose Game and Its Application to Cryptographic Protocols. USENIX Security Symposium 2016: 1085-1100 - [i19]Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji, Rafael Pass, Abhi Shelat:
A Note on Black-Box Complexity of Indistinguishability Obfuscation. IACR Cryptol. ePrint Arch. 2016: 316 (2016) - [i18]Rafael Pass, Abhi Shelat:
Micropayments for Decentralized Currencies. IACR Cryptol. ePrint Arch. 2016: 332 (2016) - [i17]Rafael Pass, Lior Seeman, Abhi Shelat:
Analysis of the Blockchain Protocol in Asynchronous Networks. IACR Cryptol. ePrint Arch. 2016: 454 (2016) - [i16]Antonio Marcedone, Rafael Pass, Abhi Shelat:
Bounded KDM Security from iO and OWF. IACR Cryptol. ePrint Arch. 2016: 688 (2016) - [i15]Jack Doerner, David Evans, Abhi Shelat:
Secure Stable Matching at Scale. IACR Cryptol. ePrint Arch. 2016: 861 (2016) - [i14]Liang Wang, Rafael Pass, Abhi Shelat, Thomas Ristenpart:
Secure Channel Injection and Anonymous Proofs of Account Ownership. IACR Cryptol. ePrint Arch. 2016: 925 (2016) - 2015
- [j7]Susan Hohenberger, Steven A. Myers, Rafael Pass, Abhi Shelat:
An Overview of ANONIZE: A Large-Scale Anonymous Survey System. IEEE Secur. Priv. 13(2): 22-29 (2015) - [j6]Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters:
Computing on Authenticated Data. J. Cryptol. 28(2): 351-395 (2015) - [c42]Abhi Shelat, Muthuramakrishnan Venkitasubramaniam:
Secure Computation from Millionaire. ASIACRYPT (1) 2015: 736-757 - [c41]Rafael Pass, Abhi Shelat:
Micropayments for Decentralized Currencies. CCS 2015: 207-218 - [c40]Nathan Brunelle, Gabriel Robins, Abhi Shelat:
Compression-Aware Algorithms for Massive Datasets. DCC 2015: 441 - [i13]Rafael Pass, Abhi Shelat:
Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings. IACR Cryptol. ePrint Arch. 2015: 383 (2015) - [i12]Susan Hohenberger, Steven A. Myers, Rafael Pass, Abhi Shelat:
ANONIZE: A Large-Scale Anonymous Survey System. IACR Cryptol. ePrint Arch. 2015: 681 (2015) - [i11]Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji, Rafael Pass, Abhi Shelat:
Lower Bounds on Assumptions behind Indistinguishability Obfuscation. IACR Cryptol. ePrint Arch. 2015: 1062 (2015) - [i10]Ahmed E. Kosba, Zhichao Zhao, Andrew Miller, Yi Qian, T.-H. Hubert Chan, Charalampos Papamanthou, Rafael Pass, Abhi Shelat, Elaine Shi:
How to Use SNARKs in Universally Composable Protocols. IACR Cryptol. ePrint Arch. 2015: 1093 (2015) - [i9]Riad S. Wahby, Max Howald, Siddharth Garg, Abhi Shelat, Michael Walfish:
Verifiable ASICs. IACR Cryptol. ePrint Arch. 2015: 1243 (2015) - 2014
- [c39]Xiao Shaun Wang, Yan Huang, T.-H. Hubert Chan, Abhi Shelat, Elaine Shi:
SCORAM: Oblivious RAM for Secure Computation. CCS 2014: 191-202 - [c38]Susan Hohenberger, Steven A. Myers, Rafael Pass, Abhi Shelat:
ANONIZE: A Large-Scale Anonymous Survey System. IEEE Symposium on Security and Privacy 2014: 375-389 - [i8]Xiao Shaun Wang, Yan Huang, T.-H. Hubert Chan, Abhi Shelat, Elaine Shi:
SCORAM: Oblivious RAM for Secure Computation. IACR Cryptol. ePrint Arch. 2014: 671 (2014) - 2013
- [j5]Steven A. Myers, Mona Sergi, Abhi Shelat:
Black-box construction of a more than non-malleable CCA1 encryption scheme from plaintext awareness. J. Comput. Secur. 21(5): 721-748 (2013) - [c37]Nathaniel Husted, Steven A. Myers, Abhi Shelat, Paul Grubbs:
GPU and CPU parallelization of honest-but-curious secure two-party computation. ACSAC 2013: 169-178 - [c36]Benjamin Kreuter, Abhi Shelat:
Lessons learned with PCF: scaling secure computation. PETShop@CCS 2013: 7-10 - [c35]Abhi Shelat, Chih-Hao Shen:
Fast two-party secure computation with minimal assumptions. CCS 2013: 523-534 - [c34]Nathan Brunelle, Gabriel Robins, Abhi Shelat:
Algorithms for Compressed Inputs. DCC 2013: 478 - [c33]Steven A. Myers, Mona Sergi, Abhi Shelat:
Black-Box Proof of Knowledge of Plaintext and Multiparty Computation with Low Communication Overhead. TCC 2013: 397-417 - [c32]Ben Kreuter, Abhi Shelat, Benjamin Mood, Kevin R. B. Butler:
PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation. USENIX Security Symposium 2013: 321-336 - [i7]Abhi Shelat, Chih-Hao Shen:
Fast Two-Party Secure Computation with Minimal Assumptions. IACR Cryptol. ePrint Arch. 2013: 196 (2013) - 2012
- [c31]Steven A. Myers, Mona Sergi, Abhi Shelat:
Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness. SCN 2012: 149-165 - [c30]Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters:
Computing on Authenticated Data. TCC 2012: 1-20 - [c29]Benjamin Kreuter, Abhi Shelat, Chih-Hao Shen:
Billion-Gate Secure Computation with Malicious Adversaries. USENIX Security Symposium 2012: 285-300 - [i6]Benjamin Kreuter, Abhi Shelat, Chih-Hao Shen:
Towards Billion-Gate Secure Computation with Malicious Adversaries. IACR Cryptol. ePrint Arch. 2012: 179 (2012) - 2011
- [j4]Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, Vinod Vaikuntanathan:
Securely Obfuscating Re-Encryption. J. Cryptol. 24(4): 694-719 (2011) - [c28]Abhi Shelat, Chih-Hao Shen:
Two-Output Secure Computation with Malicious Adversaries. EUROCRYPT 2011: 386-405 - [c27]Yan Huang, Chih-Hao Shen, David Evans, Jonathan Katz, Abhi Shelat:
Efficient Secure Computation with Garbled Circuits. ICISS 2011: 28-48 - [c26]Rafael Pass, Abhi Shelat:
Renegotiation-Safe Protocols. ICS 2011: 61-78 - [i5]Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters:
Computing on Authenticated Data. IACR Cryptol. ePrint Arch. 2011: 96 (2011) - [i4]Steven A. Myers, Mona Sergi, Abhi Shelat:
Threshold Fully Homomorphic Encryption and Secure Computation. IACR Cryptol. ePrint Arch. 2011: 454 (2011) - [i3]Abhi Shelat, Chih-Hao Shen:
Two-Output Secure Computation with Malicious Adversaries. IACR Cryptol. ePrint Arch. 2011: 533 (2011) - 2010
- [c25]Rafik Chaabouni, Helger Lipmaa, Abhi Shelat:
Additive Combinatorics and Discrete Logarithm Based Range Protocols. ACISP 2010: 336-351 - [c24]Alon Rosen, Abhi Shelat:
Optimistic Concurrent Zero Knowledge. ASIACRYPT 2010: 359-376 - [c23]Abhi Shelat:
Collusion-free protocols. BQGT 2010: 91:1
2000 – 2009
- 2009
- [c22]Joël Alwen, Jonathan Katz, Yehuda Lindell, Giuseppe Persiano, Abhi Shelat, Ivan Visconti:
Collusion-Free Multiparty Computation in the Mediated Model. CRYPTO 2009: 524-540 - [c21]Steven A. Myers, Abhi Shelat:
Bit Encryption Is Complete. FOCS 2009: 607-616 - [c20]Silvio Micali, Abhi Shelat:
Purely Rational Secret Sharing (Extended Abstract). TCC 2009: 54-71 - [i2]Rafik Chaabouni, Helger Lipmaa, Abhi Shelat:
Additive Combinatorics and Discrete Logarithm Based Range Protocols. IACR Cryptol. ePrint Arch. 2009: 469 (2009) - 2008
- [c19]Jan Camenisch, Rafik Chaabouni, Abhi Shelat:
Efficient Protocols for Set Membership and Range Proofs. ASIACRYPT 2008: 234-252 - [c18]Joël Alwen, Abhi Shelat, Ivan Visconti:
Collusion-Free Protocols in the Mediated Model. CRYPTO 2008: 497-514 - [i1]Jan Camenisch, Gregory Neven, Abhi Shelat:
Simulatable Adaptive Oblivious Transfer. IACR Cryptol. ePrint Arch. 2008: 14 (2008) - 2007
- [c17]Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan:
Bounded CCA2-Secure Encryption. ASIACRYPT 2007: 502-518 - [c16]Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan:
Relations Among Notions of Non-malleability for Encryption. ASIACRYPT 2007: 519-535 - [c15]Jan Camenisch, Gregory Neven, Abhi Shelat:
Simulatable Adaptive Oblivious Transfer. EUROCRYPT 2007: 573-590 - [c14]Ran Canetti, Rafael Pass, Abhi Shelat:
Cryptography from Sunspots: How to Use an Imperfect Reference String. FOCS 2007: 249-259 - [c13]Christian Cachin, Abhi Shelat, Alexander Shraer:
Efficient fork-linearizable access to untrusted shared memory. PODC 2007: 129-138 - [c12]Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, Vinod Vaikuntanathan:
Securely Obfuscating Re-encryption. TCC 2007: 233-252 - 2006
- [c11]Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan:
Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. CRYPTO 2006: 271-289 - [c10]Jan Camenisch, Abhi Shelat, Dieter Sommer, Roger Zimmermann:
Securing user inputs for the web. Digital Identity Management 2006: 33-44 - 2005
- [b1]Abhi Shelat:
Études in non-interactive zero-knowledge. Massachusetts Institute of Technology, Cambridge, MA, USA, 2005 - [j3]Moses Charikar, Eric Lehman, Ding Liu, Rina Panigrahy, Manoj Prabhakaran, Amit Sahai, Abhi Shelat:
The smallest grammar problem. IEEE Trans. Inf. Theory 51(7): 2554-2576 (2005) - [c9]Rafael Pass, Abhi Shelat:
Unconditional Characterizations of Non-interactive Zero-Knowledge. CRYPTO 2005: 118-134 - [c8]Jan Camenisch, Abhi Shelat, Dieter Sommer, Simone Fischer-Hübner, Marit Hansen, Henry Krasemann, Gérard Lacoste, Ronald Leenes, Jimmy C. Tseng:
Privacy and identity management for everyone. Digital Identity Management 2005: 20-27 - [c7]Matt Lepinski, Silvio Micali, Abhi Shelat:
Collusion-free protocols. STOC 2005: 543-552 - [c6]Matt Lepinski, Silvio Micali, Abhi Shelat:
Fair-Zero Knowledge. TCC 2005: 245-263 - 2004
- [c5]Andrew J. Blumberg, Abhi Shelat:
Searching for Stable Mechanisms: Automated Design for Imperfect Players. AAAI 2004: 8-13 - [c4]Matt Lepinski, Silvio Micali, Chris Peikert, Abhi Shelat:
Completely fair SFE and coalition-safe cheap talk. PODC 2004: 1-10 - 2003
- [j2]Simson L. Garfinkel, Abhi Shelat:
IEEE Security & Privacy: Data Forensics - Rememberance of Data Passed: A Study of Disk Sanitization Practices. IEEE Distributed Syst. Online 4(2) (2003) - [j1]Simson L. Garfinkel, Abhi Shelat:
Remembrance of Data Passed: A Study of Disk Sanitization Practices. IEEE Secur. Priv. 1(1): 17-27 (2003) - [c3]Chris Peikert, Abhi Shelat, Adam D. Smith:
Lower bounds for collusion-secure fingerprinting. SODA 2003: 472-479 - 2002
- [c2]Eric Lehman, Abhi Shelat:
Approximation algorithms for grammar-based compression. SODA 2002: 205-212 - [c1]Moses Charikar, Eric Lehman, Ding Liu, Rina Panigrahy, Manoj Prabhakaran, April Rasala, Amit Sahai, Abhi Shelat:
Approximating the smallest grammar: Kolmogorov complexity in natural models. STOC 2002: 792-801
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-23 00:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint