Follow
Rafael Pass
Rafael Pass
Tel-Aviv University, Cornell Tech
Verified email at cs.cornell.edu - Homepage
Title
Cited by
Cited by
Year
Analysis of the blockchain protocol in asynchronous networks
R Pass, L Seeman, A Shelat
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
7582017
Universally composable security with global setup
R Canetti, Y Dodis, R Pass, S Walfish
Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007 …, 2007
4422007
Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake
P Daian, R Pass, E Shi
Financial Cryptography and Data Security: 23rd International Conference, FC …, 2019
423*2019
Hybrid consensus: Efficient consensus in the permissionless model
R Pass, E Shi
Cryptology ePrint Archive, 2016
4072016
Fruitchains: A fair blockchain
R Pass, E Shi
Proceedings of the ACM symposium on principles of distributed computing, 315-324, 2017
3932017
Universally composable protocols with relaxed set-up assumptions
B Barak, R Canetti, JB Nielsen, R Pass
45th Annual IEEE Symposium on Foundations of Computer Science, 186-195, 2004
2572004
Thunderella: Blockchains with Optimistic Instant Confirmation
R Pass, E Shi
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
2542018
On deniability in the common reference string and random oracle model
R Pass
Advances in Cryptology-CRYPTO 2003: 23rd Annual International Cryptology …, 2003
2362003
On extractability obfuscation
E Boyle, KM Chung, R Pass
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014 …, 2014
2122014
Simulation in quasi-polynomial time, and its application to protocol composition
R Pass
EuroCrypt 2656, 160-176, 2003
2072003
New and improved constructions of non-malleable cryptographic protocols
R Pass, A Rosen
Proceedings of the thirty-seventh annual ACM symposium on Theory of …, 2005
1952005
Bounded-concurrent secure multi-party computation with a dishonest majority
R Pass
Proceedings of the thirty-sixth annual ACM symposium on Theory of computing …, 2004
1932004
Indistinguishability obfuscation from semantically-secure multilinear encodings
R Pass, K Seth, S Telang
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
1922014
Algorithmic rationality: Game theory with costly computation
JY Halpern, R Pass
Journal of Economic Theory 156, 246-268, 2015
182*2015
The sleepy model of consensus
R Pass, E Shi
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
1742017
Concurrent nonmalleable commitments
R Pass, A Rosen
SIAM Journal on Computing 37 (6), 1891-1925, 2008
1692008
Secure computation without authentication
B Barak, R Canetti, Y Lindell, R Pass, T Rabin
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
163*2005
Towards privacy for social networks: A zero-knowledge based definition of privacy
J Gehrke, E Lui, R Pass
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011 …, 2011
1592011
Succinct randomized encodings and their applications
N Bitansky, S Garg, H Lin, R Pass, S Telang
Proceedings of the forty-seventh annual ACM symposium on Theory of Computing …, 2015
1372015
Iterated regret minimization: A new solution concept
JY Halpern, R Pass
Games and Economic Behavior 74 (1), 184-207, 2012
1242012
The system can't perform the operation now. Try again later.
Articles 1–20