| Publication | Date of Publication | Type |
|---|
Credibility in private set membership Lecture Notes in Computer Science | 2023-11-16 | Paper |
A new approach to efficient non-malleable zero-knowledge Advances in Cryptology – CRYPTO 2022 | 2023-07-07 | Paper |
Black-box constructions of bounded-concurrent secure computation | 2022-12-16 | Paper |
Towards a unified approach to black-box constructions of zero-knowledge proofs | 2022-05-18 | Paper |
Compact ring signatures from learning with errors | 2022-03-31 | Paper |
Random walks and concurrent zero-knowledge | 2021-02-23 | Paper |
Improved algorithms for optimal embeddings ACM Transactions on Algorithms | 2018-11-05 | Paper |
A new approach to black-box concurrent secure computation | 2018-07-09 | Paper |
Incremental deterministic public-key encryption Journal of Cryptology | 2018-04-26 | Paper |
Block-wise non-malleable codes | 2017-12-19 | Paper |
Do distributed differentially-private protocols require oblivious transfer? | 2017-12-19 | Paper |
Incremental program obfuscation | 2017-11-15 | Paper |
Textbook non-malleable commitments Proceedings of the forty-eighth annual ACM symposium on Theory of Computing | 2017-09-29 | Paper |
Breaking the sub-exponential barrier in obfustopia Lecture Notes in Computer Science | 2017-06-23 | Paper |
On the exact round complexity of self-composable two-party computation Lecture Notes in Computer Science | 2017-06-13 | Paper |
Secure multiparty RAM computation in constant rounds Theory of Cryptography | 2016-12-21 | Paper |
Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
Deterministic Public-Key Encryption Under Continual Leakage Applied Cryptography and Network Security | 2016-10-04 | Paper |
The Exact Round Complexity of Secure Computation Advances in Cryptology – EUROCRYPT 2016 | 2016-07-15 | Paper |
Optimal computational split-state non-malleable codes Theory of Cryptography | 2016-04-08 | Paper |
Explicit non-malleable codes against bit-wise tampering and permutations Lecture Notes in Computer Science | 2015-12-10 | Paper |
Public-coin differing-inputs obfuscation and its applications Theory of Cryptography | 2015-07-06 | Paper |
A rate-optimizing compiler for non-malleable codes against bit-wise tampering and permutations Theory of Cryptography | 2015-07-06 | Paper |
Obfuscation-based non-black-box simulation and four message concurrent zero knowledge for NP Theory of Cryptography | 2015-07-06 | Paper |
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma Theory of Cryptography | 2015-07-06 | Paper |
Non-malleable zero knowledge: black-box constructions and definitional relationships Lecture Notes in Computer Science | 2014-10-14 | Paper |
Relaxed two-to-one recoding schemes Lecture Notes in Computer Science | 2014-10-14 | Paper |
Interactive proofs under continual memory leakage Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Achieving constant round leakage-resilient zero-knowledge Theory of Cryptography | 2014-02-18 | Paper |
Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Cryptography using \texttt{CAPTCHA} puzzles Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Incremental Deterministic Public-Key Encryption Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Property preserving symmetric encryption Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Publicly verifiable secret sharing for cloud-based key management Lecture Notes in Computer Science | 2011-12-16 | Paper |
Efficiency preserving transformations for concurrent non-malleable zero knowledge Theory of Cryptography | 2010-02-24 | Paper |
Computational Differential Privacy Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |
Adaptive One-Way Functions and Applications Lecture Notes in Computer Science | 2009-02-10 | Paper |
Bounded Ciphertext Policy Attribute Based Encryption Automata, Languages and Programming | 2008-08-19 | Paper |
Precise Concurrent Zero Knowledge Advances in Cryptology – EUROCRYPT 2008 | 2008-04-15 | Paper |
Private Locally Decodable Codes Automata, Languages and Programming | 2007-11-28 | Paper |
Topics in Cryptology – CT-RSA 2006 Lecture Notes in Computer Science | 2007-02-12 | Paper |