Selected Additional Publications

Dwork, C., F. Feldman, M. Hardt, T. Pitassi, O. Reingold, and A. L. Roth. “Preserving statistical validity in adaptive data analysis.” Proceedings of the 47th Annual ACM Symposium on Theory of Computing. STOC, 2015. DownloadAbstract
See also: Dwork, C., Feldman, V., Hardt, M., Pitassi, T., Reingold, O. and Roth, A., 2015. "The reusable holdout: Preserving validity in adaptive data analysis". Science, 349 (6248), pp. 636-638.
Zemel, R., Y. Wu, K. Swersky, T. Pitassi, and C. Dwork. “Learning fair representations.” Proceedings of the 30th International Conference on Machine Learning (PMLR), 2013, 28, 3, 325-333. Download
Dwork, C., M. Hardt, T. Pitassi, O. Reingold, and R. Zemel. “Fairness through awareness.” Proceedings of the 3rd Innovations in Theoretical Computer Science Conference (ITCS 12), 2012, 214-226. Download
Dwork, C., F. McSherry, K. Nissim, and A. Smith. “Calibrating noise to sensitivity in private data analysis.” Theory of Cryptography Conference , 2006, 265-284. DownloadAbstract

Notes: Appeared in Journal of Privacy and Confidentiality, 2016. 

Winner of 2017 Gödel Prize.

Dwork, C.Differential privacy.” International Colloquium on Automata, Languages, and Programming. ICALP, 2006. Download
Dolev, D., C. Dwork, and M. Naor. “Non-malleable cryptography.” SIAM Journal on Computing 30, no. 2 (2000). DownloadAbstract

Selected for SIAM Review 200345 (4), pp.727 -784.

Ajtai, M., and C. Dwork. “A public-key cryptosystem with worst-case/ average-case equivalence.” Proceedings of the 29th Annual ACM Symposium on Theory of Computing, 1997, 284-293. Download
Dwork, C., and M. Naor. “Pricing via processing or combatting junk mail.” Advances in Cryptology: CRYPTO 1992. Annual International Cryptography Conference, 1992. Download
Dolev, D., C. Dwork, and M. Naor. “Non-malleable cryptography.” Proceedings of the 23rd Annual ACM Symposium on Theory of Computing (STOC '91) (1991): 542-552. Download
Dwork, C., N. Lynch, and L. Stockmeyer. “Consensus in the presence of partial synchrony.” Journal of the ACM (JACM) 35, no. 2 (1988): 288-323. DownloadAbstract
Note: Winner of the 2007 Dijkstra Prize.