Daniel Genkin

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Snapshot-oblivious RAMs: sub-logarithmic efficiency for short transcripts
Advances in Cryptology – CRYPTO 2022
2023-07-07Paper
Fast large-scale honest-majority MPC for malicious adversaries
Journal of Cryptology
2023-07-05Paper
Side-channeling the \textsf{Kalyna} key expansion2022-07-06Paper
Fast large-scale honest-majority MPC for malicious adversaries2020-06-30Paper
Sliding right into disaster: left-to-right sliding windows leak
Lecture Notes in Computer Science
2020-06-24Paper
Closure under reversal of languages over infinite alphabets2018-11-28Paper
Best of both worlds in secure computation, with low communication overhead2018-08-10Paper
Stealing keys from PCs using a radio: cheap electromagnetic attacks on windowed exponentiation2018-02-14Paper
How to construct a leakage-resilient (stateless) trusted party2018-01-19Paper
Computational integrity with a public random string from quasi-linear PCPs
Lecture Notes in Computer Science
2017-06-23Paper
Acoustic cryptanalysis
Journal of Cryptology
2017-05-22Paper
Fast reductions from RAMs to delegatable succinct constraint satisfaction problems
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
2017-05-16Paper
Binary AMD circuits from secure multiparty computation
Theory of Cryptography
2016-12-21Paper
ECDH key-extraction via low-bandwidth electromagnetic attacks on PCs
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
Efficient multi-party computation: from passive to active security via secure SIMD circuits
Lecture Notes in Computer Science
2015-12-10Paper
Circuits resilient to additive attacks with applications to secure computation
Proceedings of the forty-sixth annual ACM symposium on Theory of computing
2015-06-26Paper
On the concrete efficiency of probabilistically-checkable proofs
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2014-08-07Paper
RSA key extraction via low-bandwidth acoustic cryptanalysis
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
A note on the emptiness problem for alternating finite-memory automata
Theoretical Computer Science
2014-03-13Paper
Snarks for C: verifying program executions succinctly and in zero knowledge
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Extending free pregroups with lower bounds
Studia Logica
2010-09-20Paper
Mildly context-sensitive languages via buffer augmented pregroup grammars
Time for Verification
2010-09-07Paper


Research outcomes over time


This page was built for person: Daniel Genkin