Rafael Pass
Rafael Pass
Cornell University, Cornell Tech
Verified email at cs.cornell.edu - Homepage
Cited by
Cited by
Analysis of the blockchain protocol in asynchronous networks
R Pass, L Seeman, A Shelat
Annual International Conference on the Theory and Applications of …, 2017
Universally composable security with global setup
R Canetti, Y Dodis, R Pass, S Walfish
Theory of Cryptography Conference, 61-85, 2007
Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake
P Daian, R Pass, E Shi
International Conference on Financial Cryptography and Data Security, 23-41, 2019
Hybrid consensus: Efficient consensus in the permissionless model
R Pass, E Shi
Cryptology ePrint Archive, 2016
Fruitchains: A fair blockchain
R Pass, E Shi
Proceedings of the ACM Symposium on Principles of Distributed Computing, 315-324, 2017
Universally composable protocols with relaxed set-up assumptions
B Barak, R Canetti, JB Nielsen, R Pass
45th Annual IEEE Symposium on Foundations of Computer Science, 186-195, 2004
On deniability in the common reference string and random oracle model
R Pass
Annual International Cryptology Conference, 316-337, 2003
On extractability obfuscation
E Boyle, KM Chung, R Pass
Theory of Cryptography Conference, 52-73, 2014
Simulation in quasi-polynomial time, and its application to protocol composition
R Pass
International Conference on the Theory and Applications of Cryptographic …, 2003
Thunderella: Blockchains with Optimistic Instant Confirmation
R Pass, E Shi
Annual International Conference on the Theory and Applications of …, 2018
New and improved constructions of nonmalleable cryptographic protocols
R Pass, A Rosen
SIAM Journal on Computing 38 (2), 702-752, 2008
Bounded-concurrent secure multi-party computation with a dishonest majority
R Pass
Proceedings of the thirty-sixth annual ACM symposium on Theory of computing …, 2004
Indistinguishability obfuscation from semantically-secure multilinear encodings
R Pass, K Seth, S Telang
Annual Cryptology Conference, 500-517, 2014
Algorithmic rationality: Game theory with costly computation
JY Halpern, R Pass
Journal of Economic Theory 156, 246-268, 2015
Concurrent nonmalleable commitments
R Pass, A Rosen
SIAM Journal on Computing 37 (6), 1891-1925, 2008
Secure computation without authentication
B Barak, R Canetti, Y Lindell, R Pass, T Rabin
Annual International Cryptology Conference, 361-377, 2005
Towards privacy for social networks: A zero-knowledge based definition of privacy
J Gehrke, E Lui, R Pass
Theory of cryptography conference, 432-449, 2011
The sleepy model of consensus
R Pass, E Shi
International Conference on the Theory and Application of Cryptology and …, 2017
Succinct randomized encodings and their applications
N Bitansky, S Garg, H Lin, R Pass, S Telang
Proceedings of the forty-seventh annual ACM symposium on Theory of Computing …, 2015
Crowd-blending privacy
J Gehrke, M Hay, E Lui, R Pass
Annual Cryptology Conference, 479-496, 2012
The system can't perform the operation now. Try again later.
Articles 1–20