| Publication | Date of Publication | Type |
|---|
| Threshold Schnorr with stateless deterministic signing from standard assumptions | 2022-03-31 | Paper |
| BETA: biometric-enabled threshold authentication | 2021-12-21 | Paper |
| Private set operations from oblivious switching | 2021-12-21 | Paper |
Fast optimistically fair cut-and-choose 2PC Financial Cryptography and Data Security | 2021-04-07 | Paper |
| Non-interactive zero-knowledge proofs for composite statements | 2020-06-30 | Paper |
Non-interactive secure 2PC in the offline/online and batch settings Lecture Notes in Computer Science | 2017-06-23 | Paper |
Sublinear zero-knowledge arguments for RAM programs Lecture Notes in Computer Science | 2017-06-13 | Paper |
\textbf{TWORAM:} efficient oblivious RAM in two rounds with applications to searchable encryption Advances in Cryptology – CRYPTO 2016 | 2016-11-09 | Paper |
Efficient zero-knowledge proof of algebraic and non-algebraic statements with applications to privacy preserving credentials Advances in Cryptology – CRYPTO 2016 | 2016-11-09 | Paper |
Rate-limited secure function evaluation Theoretical Computer Science | 2016-10-21 | Paper |
Efficient zero-knowledge proofs of non-algebraic statements with sublinear amortized cost Lecture Notes in Computer Science | 2015-12-10 | Paper |
How to efficiently evaluate RAM programs with malicious security Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
Richer Efficiency/Security Trade-offs in 2PC Theory of Cryptography | 2015-07-06 | Paper |
Actively Secure Private Function Evaluation Lecture Notes in Computer Science | 2015-01-06 | Paper |
Flexor: Flexible garbling for XOR gates that beats free-XOR Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Non-interactive secure computation based on cut-and-choose Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Enhanced chosen-ciphertext security and applications Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Garbled circuits checking garbled circuits: more efficient and secure two-party computation Advances in Cryptology – CRYPTO 2013 | 2013-09-17 | Paper |
Efficient multiparty computation for arithmetic circuits against a covert majority Progress in Cryptology – AFRICACRYPT 2013 | 2013-06-07 | Paper |
How to hide circuits in MPC an efficient framework for private function evaluation Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Rate-limited secure function evaluation: definitions and constructions Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
An efficient protocol for oblivious DFA evaluation and applications Lecture Notes in Computer Science | 2012-06-08 | Paper |
One-time signatures and chameleon hash functions Selected Areas in Cryptography | 2011-03-15 | Paper |
A Closer Look at Anonymity and Robustness in Encryption Schemes Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
Efficient and Secure Evaluation of Multivariate Polynomials and Applications Applied Cryptography and Network Security | 2010-07-06 | Paper |
Adaptive trapdoor functions and chosen-ciphertext security Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Communication-Efficient Private Protocols for Longest Common Subsequence Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries Lecture Notes in Computer Science | 2009-02-10 | Paper |
Multi-party Indirect Indexing and Applications Advances in Cryptology – ASIACRYPT 2007 | 2008-05-15 | Paper |
Improved Efficiency for Private Stable Matching Lecture Notes in Computer Science | 2008-04-17 | Paper |
Constant-Round Private Database Queries Automata, Languages and Programming | 2007-11-28 | Paper |
Secure Linear Algebra Using Linearly Recurrent Sequences Theory of Cryptography | 2007-08-30 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |