Watermarking cryptographic capabilities A Cohen, J Holmgren, R Nishimaki, V Vaikuntanathan, D Wichs Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016 | 115* | 2016 |
Towards formalizing the GDPR’s notion of singling out A Cohen, K Nissim Proceedings of the National Academy of Sciences 117 (15), 8344-8352, 2020 | 78 | 2020 |
From soft classifiers to hard decisions: How fair can we be? R Canetti, A Cohen, N Dikkala, G Ramnarayan, S Scheffler, A Smith Proceedings of the conference on fairness, accountability, and transparency …, 2019 | 49 | 2019 |
What about bob? the inadequacy of CPA security for proxy reencryption A Cohen IACR International Workshop on Public Key Cryptography, 287-316, 2019 | 40 | 2019 |
Linear program reconstruction in practice A Cohen, K Nissim arXiv preprint arXiv:1810.05692, 2018 | 36 | 2018 |
Compelled Decryption and the Fifth Amendment: Exploring the Technical Boundaries A Cohen, S Park Harvard Journal of Law & Technology 32, 2018 | 36 | 2018 |
Cryptography with updates P Ananth, A Cohen, A Jain Annual International Conference on the Theory and Applications of …, 2017 | 28 | 2017 |
What a hybrid legal-technical analysis teaches us about privacy regulation: The case of singling out M Altman, A Cohen, K Nissim, A Wood BUJ Sci. & Tech. L. 27, 1, 2021 | 26 | 2021 |
Attacks on Deidentification's Defenses A Cohen 31st USENIX Security Symposium (USENIX Security 2022), 2022 | 16 | 2022 |
Census TopDown: The impacts of differential privacy on redistricting A Cohen, M Duchin, JN Matthews, B Suwal arXiv preprint arXiv:2203.05085, 2022 | 16 | 2022 |
Aggregate pseudorandom functions and connections to learning A Cohen, S Goldwasser, V Vaikuntanathan Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015 | 16 | 2015 |
Faster optimal planning with partial-order pruning D Hall, A Cohen, D Burkett, D Klein Proceedings of the International Conference on Automated Planning and …, 2013 | 15 | 2013 |
Private numbers in public policy: Census, differential privacy, and redistricting A Cohen, M Duchin, JN Matthews, B Suwal Harvard Data Science Review, 2022 | 10 | 2022 |
Data protection's composition problem A Fluitt, A Cohen, M Altman, K Nissim, S Viljoen, A Wood Eur. Data Prot. L. Rev. 5, 285, 2019 | 8 | 2019 |
The GGM function family is a weakly one-way family of functions A Cohen, S Klein Theory of Cryptography Conference, 84-107, 2016 | 6* | 2016 |
Multi-Regulation Computing: Examining the Legal and Policy Questions That Arise From Secure Multiparty Computation JM Walsh, M Varia, A Cohen, A Sellars, A Bestavros Proceedings of the 2022 Symposium on Computer Science and Law, 53-65, 2022 | 3 | 2022 |
Can the Government Compel Decryption? Don't Trust-Verify A Cohen, S Scheffler, M Varia Proceedings of the 2022 Symposium on Computer Science and Law, 23-36, 2022 | 2 | 2022 |
Multilinear pseudorandom functions A Cohen, J Holmgren Automata, Languages, and Programming: 42nd International Colloquium, ICALP …, 2015 | 2 | 2015 |
Control, Confidentiality, and the Right to be Forgotten A Cohen, A Smith, M Swanberg, PN Vasudevan arXiv preprint arXiv:2210.07876, 2022 | 1 | 2022 |
A principled approach to defining anonymization as applied to EU data protection law M Altman, A Cohen, F Falzon, EA Markatou, K Nissim, MJ Reymond, ... Kobbi and Reymond, Michel Jose and Saraogi, Sidhant and Wood, Alexandra, A …, 2022 | 1 | 2022 |