| Publication | Date of Publication | Type |
|---|
Private join and compute from PIR with default Lecture Notes in Computer Science | 2023-05-12 | Paper |
Anonymous tokens with private metadata bit | 2022-11-09 | Paper |
Communication-efficient proactive MPC for dynamic groups with dishonest majorities | 2022-11-09 | Paper |
Private Set Intersection and Compute Protecting Privacy through Homomorphic Encryption | 2022-11-02 | Paper |
On the (in)security of ROS Journal of Cryptology | 2022-09-23 | Paper |
On the (in)security of ROS Lecture Notes in Computer Science | 2021-12-08 | Paper |
Communication-efficient proactive secret sharing for dynamic groups with dishonest majorities | 2021-02-23 | Paper |
Public-key function-private hidden vector encryption (and more) | 2020-05-11 | Paper |
New techniques for obfuscating conjunctions | 2020-02-04 | Paper |
Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression Journal of Cryptology | 2018-09-14 | Paper |
Optimization of bootstrapping in circuits Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms | 2018-07-16 | Paper |
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Journal of Cryptology | 2018-05-28 | Paper |
Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression Fast Software Encryption | 2018-05-09 | Paper |
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13 Lecture Notes in Computer Science | 2017-06-13 | Paper |
FHE over the Integers: Decomposed and Batched in the Post-Quantum Regime Lecture Notes in Computer Science | 2017-06-13 | Paper |
Cryptanalysis of GGH15 multilinear maps Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
NFLlib: NTT-Based Fast Lattice Library Topics in Cryptology - CT-RSA 2016 | 2016-04-08 | Paper |
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations Lecture Notes in Computer Science | 2015-12-10 | Paper |
New Multilinear Maps Over the Integers Lecture Notes in Computer Science | 2015-12-10 | Paper |
Cryptanalysis of the co-ACD assumption Lecture Notes in Computer Science | 2015-12-10 | Paper |
Two attacks on a white-box AES implementation Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
White-box security notions for symmetric encryption schemes Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
A comparison of the homomorphic encryption schemes FV and YASHE Progress in Cryptology – AFRICACRYPT 2014 | 2014-06-24 | Paper |
Scale-invariant fully homomorphic encryption over the integers Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Lattice signatures and bimodal Gaussians Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Practical multilinear maps over the integers Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Batch fully homomorphic encryption over the integers Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Partial key exposure on RSA with private exponents larger than \(N\) Information Security Practice and Experience | 2012-06-29 | Paper |