Dana Dachman-Soled

1.6k total citations
15 papers, 76 citations indexed

About

Dana Dachman-Soled is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Hardware and Architecture. According to data from OpenAlex, Dana Dachman-Soled has authored 15 papers receiving a total of 76 indexed citations (citations by other indexed papers that have themselves been cited), including 14 papers in Artificial Intelligence, 4 papers in Computer Vision and Pattern Recognition and 2 papers in Hardware and Architecture. Recurrent topics in Dana Dachman-Soled's work include Cryptography and Data Security (11 papers), Cryptographic Implementations and Security (8 papers) and Coding theory and cryptography (3 papers). Dana Dachman-Soled is often cited by papers focused on Cryptography and Data Security (11 papers), Cryptographic Implementations and Security (8 papers) and Coding theory and cryptography (3 papers). Dana Dachman-Soled collaborates with scholars based in United States, France and Germany. Dana Dachman-Soled's co-authors include Ankur Srivastava, Yuntao Liu, Arkady Yerukhimovich, Seung Geol Choi, Ray Perlner, Tal Malkin, Daniel Apon, Thinh Dang, Daniel Genkin and Hoeteck Wee and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Transactions on Information Forensics and Security and Information and Computation.

In The Last Decade

Dana Dachman-Soled

13 papers receiving 68 citations

Peers

Dana Dachman-Soled
Meltem Sönmez Turan United States
Alex J. Malozemoff United States
Alexandre Duc Switzerland
Daniel Apon United States
Nicky Mouha Belgium
Aleksei Udovenko Luxembourg
Itai Dinur Israel
Meltem Sönmez Turan United States
Dana Dachman-Soled
Citations per year, relative to Dana Dachman-Soled Dana Dachman-Soled (= 1×) peers Meltem Sönmez Turan

Countries citing papers authored by Dana Dachman-Soled

Since Specialization
Citations

This map shows the geographic impact of Dana Dachman-Soled's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Dana Dachman-Soled with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Dana Dachman-Soled more than expected).

Fields of papers citing papers by Dana Dachman-Soled

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Dana Dachman-Soled. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Dana Dachman-Soled. The network helps show where Dana Dachman-Soled may publish in the future.

Co-authorship network of co-authors of Dana Dachman-Soled

This figure shows the co-authorship network connecting the top 25 collaborators of Dana Dachman-Soled. A scholar is included among the top collaborators of Dana Dachman-Soled based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Dana Dachman-Soled. Dana Dachman-Soled is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

15 of 15 papers shown
1.
Tian, Xin, et al.. (2024). A Canonical Data Transformation for Achieving Inter- and Within-Group Fairness. IEEE Transactions on Information Forensics and Security. 19. 7449–7464. 1 indexed citations
2.
Ball, Marshall, et al.. (2023). Extracting Randomness from Samplable Distributions, Revisited. 1505–1514.
3.
Kwong, Andrew, Thinh Dang, Dana Dachman-Soled, et al.. (2022). When Frodo Flips. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 979–993. 20 indexed citations
4.
Dachman-Soled, Dana, et al.. (2020). (In)Security of Ring-LWE Under Partial Key Exposure. Journal of Mathematical Cryptology. 15(1). 72–86. 3 indexed citations
5.
Dachman-Soled, Dana, et al.. (2020). Towards a Ring Analogue of the Leftover Hash Lemma. Journal of Mathematical Cryptology. 15(1). 87–110. 2 indexed citations
6.
Choi, Seung Geol, et al.. (2020). Differentially-Private Multi-Party Sketching for Large-Scale Statistics. SHILAP Revista de lepidopterología. 2020(3). 153–174. 11 indexed citations
7.
Dachman-Soled, Dana, et al.. (2019). Tight upper and lower bounds for leakage-resilient, locally decodable and updatable non-malleable codes. Information and Computation. 268. 104428–104428. 3 indexed citations
8.
Liu, Yuntao, Dana Dachman-Soled, & Ankur Srivastava. (2019). Mitigating Reverse Engineering Attacks on Deep Neural Networks. 657–662. 20 indexed citations
9.
Dachman-Soled, Dana, et al.. (2019). Feasibility and Infeasibility of Secure Computation with Malicious PUFs. Journal of Cryptology. 33(2). 595–617. 1 indexed citations
10.
Dachman-Soled, Dana, Feng-Hao Liu, Elaine Shi, & Hong-Sheng Zhou. (2018). Locally Decodable and Updatable Non-malleable Codes and Their Applications. Journal of Cryptology. 33(1). 319–355. 2 indexed citations
11.
Dachman-Soled, Dana, Steven Gordon, Feng-Hao Liu, Adam O’Neill, & Hong-Sheng Zhou. (2018). Leakage Resilience from Program Obfuscation. Journal of Cryptology. 32(3). 742–824. 3 indexed citations
12.
Dachman-Soled, Dana, Chang Liu, Charalampos Papamanthou, Elaine Shi, & Uzi Vishkin. (2018). Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness. Journal of Cryptology. 32(3). 941–972.
13.
Choi, Seung Geol, Dana Dachman-Soled, Tal Malkin, & Hoeteck Wee. (2017). Improved, black-box, non-malleable encryption from semantic security. Designs Codes and Cryptography. 86(3). 641–663. 1 indexed citations
14.
Choi, Seung Geol, Dana Dachman-Soled, Tal Malkin, & Hoeteck Wee. (2017). A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption. Journal of Cryptology. 31(1). 172–201. 5 indexed citations
15.
Dachman-Soled, Dana, Homin K. Lee, Tal Malkin, et al.. (2009). . Theory of Computing. 5(1). 257–282. 4 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026