Doubly-efficient zkSNARKs without trusted setup RS Wahby, I Tzialla, A Shelat, J Thaler, M Walfish
2018 IEEE Symposium on Security and Privacy (SP), 926-943, 2018
397 2018 Practical verified computation with streaming interactive proofs G Cormode, M Mitzenmacher, J Thaler
Proceedings of the 3rd Innovations in Theoretical Computer Science …, 2012
307 2012 Time-optimal interactive proofs for circuit evaluation J Thaler
Annual Cryptology Conference, 71-89, 2013
281 2013 Brakedown: Linear-time and field-agnostic SNARKs for R1CS A Golovnev, J Lee, S Setty, J Thaler, RS Wahby
Annual International Cryptology Conference, 193-226, 2023
159 * 2023 Reliably learning the relu in polynomial time S Goel, V Kanade, A Klivans, J Thaler
Conference on Learning Theory, 1004-1042, 2017
148 2017 Proofs, arguments, and zero-knowledge J Thaler
Foundations and Trends® in Privacy and Security 4 (2–4), 117-660, 2022
129 2022 Faster algorithms for privately releasing marginals J Thaler, J Ullman, S Vadhan
International Colloquium on Automata, Languages, and Programming, 810-821, 2012
110 2012 Full accounting for verifiable outsourcing RS Wahby, Y Ji, AJ Blumberg, A Shelat, J Thaler, M Walfish, T Wies
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
101 2017 {Verifiable} Computation with Massively Parallel Interactive Proofs J Thaler, M Roberts, M Mitzenmacher, H Pfister
4th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 12), 2012
100 2012 Verifying computations with streaming interactive proofs G Cormode, J Thaler, K Yi
arXiv preprint arXiv:1109.6882, 2011
94 2011 The polynomial method strikes back: Tight quantum query bounds via dual polynomials M Bun, R Kothari, J Thaler
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing …, 2018
79 2018 Unlocking the lookup singularity with lasso S Setty, J Thaler, R Wahby
Annual International Conference on the Theory and Applications of …, 2024
75 2024 Dual lower bounds for approximate degree and Markov–Bernstein inequalities M Bun, J Thaler
Information and Computation 243, 2-25, 2015
68 2015 Hierarchical heavy hitters with the space saving algorithm M Mitzenmacher, T Steinke, J Thaler
2012 Proceedings of the Fourteenth Workshop on Algorithm Engineering and …, 2012
63 2012 Customizable constraint systems for succinct arguments S Setty, J Thaler, R Wahby
Cryptology ePrint Archive, 2023
57 2023 Variable selection is hard D Foster, H Karloff, J Thaler
Conference on Learning Theory, 696-709, 2015
57 2015 Jolt: Snarks for virtual machines via lookups A Arun, S Setty, J Thaler
Annual International Conference on the Theory and Applications of …, 2024
54 2024 Faster private release of marginals on small databases K Chandrasekaran, J Thaler, J Ullman, A Wan
Proceedings of the 5th conference on Innovations in theoretical computer …, 2014
54 2014 On the power of statistical zero knowledge A Bouland, L Chen, D Holden, J Thaler, PN Vasudevan
SIAM Journal on Computing 49 (4), FOCS17-1-FOCS17-58, 2019
51 2019 A Nearly Optimal Lower Bound on the Approximate Degree of AC M Bun, J Thaler
SIAM Journal on Computing 49 (4), FOCS17-59-FOCS17-96, 2019
47 2019