| Publication | Date of Publication | Type |
|---|
| On building fine-grained one-way functions from strong average-case hardness | 2025-01-17 | Paper |
| Instantiating the hash-then-evaluate paradigm: strengthening PRFs, PCFs, and OPRFs | 2025-01-10 | Paper |
| An efficient ZK compiler from SIMD circuits to general circuits | 2024-12-27 | Paper |
| 10-party sublinear secure computation from standard assumptions | 2024-12-13 | Paper |
| Fine-grained non-interactive key exchange, revisited | 2024-12-04 | Paper |
| Fast public-key silent OT and more from constrained Naor-Reingold | 2024-11-13 | Paper |
| Correlated pseudorandomness from the hardness of quasi-abelian decoding | 2024-02-06 | Paper |
| A note on non-interactive zero-knowledge from CDH | 2024-02-06 | Paper |
| Fine-grained non-interactive key-exchange: constructions and lower bounds | 2024-01-16 | Paper |
| Oblivious transfer with constant computational overhead | 2024-01-16 | Paper |
| Constrained pseudorandom functions from homomorphic secret sharing | 2023-12-12 | Paper |
| Sublinear-communication secure multiparty computation does not require FHE | 2023-12-08 | Paper |
| Short signatures from regular syndrome decoding in the head | 2023-12-08 | Paper |
| Pseudorandom correlation functions from variable-density LPN, revisited | 2023-11-16 | Paper |
| Improved private set intersection for sets with small entries | 2023-11-16 | Paper |
| Random sources in private computation | 2023-08-25 | Paper |
| Non-interactive secure computation of inner-product from LPN and LWE | 2023-08-25 | Paper |
| Sublinear secure computation from new assumptions | 2023-08-14 | Paper |
| Anonymous whistleblowing over authenticated channels | 2023-08-14 | Paper |
| Correlated pseudorandomness from expand-accumulate codes | 2023-06-28 | Paper |
| Efficient NIZKs for algebraic sets | 2023-05-12 | Paper |
| On derandomizing Yao's weak-to-strong OWF construction | 2023-04-13 | Paper |
| Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer | 2023-04-13 | Paper |
| Statistical ZAPs from group-based assumptions | 2023-03-31 | Paper |
| Shorter non-interactive zero-knowledge arguments and ZAPs for algebraic languages | 2022-12-07 | Paper |
| Efficient pseudorandom correlation generators from ring-LPN | 2022-11-09 | Paper |
| The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO | 2022-10-13 | Paper |
| On building fine-grained one-way functions from strong average-case hardness | 2022-08-30 | Paper |
| Low-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2]\) | 2022-05-18 | Paper |
| Silver: silent VOLE and oblivious transfer from hardness of decoding structured LDPC codes | 2022-04-22 | Paper |
| On pseudorandom encodings | 2022-03-23 | Paper |
| Breaking the circuit size barrier for secure computation under quasi-polynomial LPN | 2021-12-08 | Paper |
| Efficient range proofs with transparent setup from bounded integer commitments | 2021-12-08 | Paper |
| Non-interactive zero-knowledge in pairing-free groups from weaker assumptions | 2021-12-01 | Paper |
| Efficient pseudorandom correlation generators: silent OT extension and more | 2020-03-09 | Paper |
| A note on the communication complexity of multiparty computation in the correlated randomness model | 2020-02-06 | Paper |
| Designated-verifier pseudorandom generators, and their applications | 2020-02-06 | Paper |
| Non-interactive keyed-verification anonymous credentials | 2020-01-28 | Paper |
| On the concrete security of Goldreich's pseudorandom generator | 2019-01-23 | Paper |
| New protocols for secure equality test and comparison | 2018-08-10 | Paper |
| Efficient designated-verifier non-interactive zero-knowledge proofs of knowledge | 2018-07-17 | Paper |
| Encryption Switching Protocols | 2016-11-30 | Paper |
| Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting | 2015-12-10 | Paper |