
views: 275
Elaine Shi
Associate Professor
Sign in to view more

Ego Network
D-Core
Research Interests
Author Statistics
Experience
Sign in to view more
Education
Sign in to view more
Bio
I design and build systems that are efficient, provably secure, and friendly to users and programmers. To this end, I take an interdisciplinary approach that blends cryptography, systems security, and language-based security.
Papers173 papers
Sort
By YearBy Citation
SODA '20: ACM-SIAM Symposium on Discrete Algorithms
Salt Lake City
Utah
Janua..., pp.2349-2365, (2020)
IACR Cryptol. ePrint Arch., (2020): 677
IACR Cryptology ePrint Archive, (2020): 125
IACR Cryptology ePrint Archive, (2020): 240
DISC, (2020)
public key cryptography, pp.246-265, (2020)
ITC, (2020)
IACR Cryptol. ePrint Arch., (2020): 604
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1, (2019): 499-529
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, no. 8 (2019): 1572-1576
EIWOSBibtex
Financial Cryptography, pp.23-41, (2019)
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT II, (2019): 214-243
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, (2019)
SODA '19: Symposium on Discrete Algorithms
San Diego
California
January, 2019, pp.2448-2467, (2019)
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT I, (2019): 720-749
IACR Cryptology ePrint Archive, (2019): 179
IACR Cryptology ePrint Archive, (2019): 886
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, (2019): 997-1008
View All