Adam Smith edit

Affiliation MIT
Publications 195
H-index 24
Sorted by:

Publications

#Cited
617 Calibrating noise to sensitivity in private data analysis - In Proceedings of the 3rd Theory of Cryptography Conference - 2006
525 Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data - - 2004
164 Smooth sensitivity and sampling in private data analysis - In STOC - 2007
107 Toward privacy in public databases - - 2005
97 What Can We Learn Privately? - 49TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE - 2008
84 Secure remote authentication using biometric data - In EUROCRYPT - 2005
77 Composition attacks and auxiliary information in data privacy - CoRR - 2008
69 Robust fuzzy extractors and authenticated key agreement from close secrets - In Advances in Cryptology — Crypto 2006, volume 4117 of LNCS - 2006
64 Correcting errors without leaking partial information - In 37th Annual ACM Symposium on Theory of Computing (STOC - 2005
64 Efficient and Non-Interactive Non-Malleable Commitment - - 2001
59 Authentication of quantum messages - - 2002
47 On Perfect and Adaptive Security in Exposure-Resilient Cryptography - - 2001
42 Differential privacy for statistics: What we know and what we want to learn - Journal of Privacy and Confidentiality
39 Cloning of an Enterococcus faecalis endocarditis antigen: homology with adhesins from some oral streptococci. Infect. Immun - - 1995
38 The Price of Privately Releasing Contingency Tables and the Spectra of Random Matrices with Correlated Rows -
35 Round Efficiency of Multi-Party Computation with a Dishonest Majority - In Eurocrypt ’03, 2003. LNCS - 2003
34 Discovering frequent patterns in sensitive data -
32 Efficient two party and multi party computation against covert adversaries - In EUROCRYPT
31 Entropic security and the encryption of high entropy messages - In Theory of Cryptography Conference (TCC) ’05 - 2005
30 Secure Multi-party Quantum Computation - - 2002

View completed publications >>