Volgen
Aloni Cohen
Aloni Cohen
Geverifieerd e-mailadres voor uchicago.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Watermarking cryptographic capabilities
A Cohen, J Holmgren, R Nishimaki, V Vaikuntanathan, D Wichs
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016
117*2016
Towards formalizing the GDPR’s notion of singling out
A Cohen, K Nissim
Proceedings of the National Academy of Sciences 117 (15), 8344-8352, 2020
972020
From soft classifiers to hard decisions: How fair can we be?
R Canetti, A Cohen, N Dikkala, G Ramnarayan, S Scheffler, A Smith
Proceedings of the conference on fairness, accountability, and transparency …, 2019
562019
What about bob? The inadequacy of CPA security for proxy reencryption
A Cohen
IACR International Workshop on Public Key Cryptography, 287-316, 2019
482019
Linear program reconstruction in practice
A Cohen, K Nissim
arXiv preprint arXiv:1810.05692, 2018
432018
Compelled Decryption and the Fifth Amendment: Exploring the Technical Boundaries
A Cohen, S Park
Harvard Journal of Law & Technology 32, 2018
362018
What a hybrid legal-technical analysis teaches us about privacy regulation: The case of singling out
M Altman, A Cohen, K Nissim, A Wood
BUJ Sci. & Tech. L. 27, 1, 2021
332021
Cryptography with updates
P Ananth, A Cohen, A Jain
Annual International Conference on the Theory and Applications of …, 2017
292017
Attacks on Deidentification's Defenses
A Cohen
31st USENIX Security Symposium (USENIX Security 2022), 2022
222022
Aggregate pseudorandom functions and connections to learning
A Cohen, S Goldwasser, V Vaikuntanathan
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
192015
Census TopDown: The impacts of differential privacy on redistricting
A Cohen, M Duchin, JN Matthews, B Suwal
2nd Symposium on Foundations of Responsible Computing (FORC 2021)., 5:1-5:22, 2021
172021
Faster optimal planning with partial-order pruning
D Hall, A Cohen, D Burkett, D Klein
Proceedings of the International Conference on Automated Planning and …, 2013
152013
Private numbers in public policy: Census, differential privacy, and redistricting
A Cohen, M Duchin, JN Matthews, B Suwal
Harvard Data Science Review, 2022
142022
Data protection's composition problem
A Fluitt, A Cohen, M Altman, K Nissim, S Viljoen, A Wood
Eur. Data Prot. L. Rev. 5, 285, 2019
112019
The GGM function family is a weakly one-way family of functions
A Cohen, S Klein
Theory of Cryptography Conference, 84-107, 2016
7*2016
Multi-regulation computing: Examining the legal and policy questions that arise from secure multiparty computation
JM Walsh, M Varia, A Cohen, A Sellars, A Bestavros
Proceedings of the 2022 Symposium on Computer Science and Law, 53-65, 2022
42022
Control, Confidentiality, and the Right to be Forgotten
A Cohen, A Smith, M Swanberg, PN Vasudevan
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
32023
Multilinear pseudorandom functions
A Cohen, J Holmgren
Automata, Languages, and Programming: 42nd International Colloquium, ICALP …, 2015
32015
Can the Government Compel Decryption? Don't Trust-Verify
A Cohen, S Scheffler, M Varia
Proceedings of the 2022 Symposium on Computer Science and Law, 23-36, 2022
22022
A principled approach to defining anonymization as applied to EU data protection law
M Altman, A Cohen, F Falzon, EA Markatou, K Nissim, MJ Reymond, ...
Kobbi and Reymond, Michel Jose and Saraogi, Sidhant and Wood, Alexandra, A …, 2022
12022
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20