Payman Mohassel

From MaRDI portal
(Redirected from Person:329718)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Threshold Schnorr with stateless deterministic signing from standard assumptions2022-03-31Paper
BETA: biometric-enabled threshold authentication2021-12-21Paper
Private set operations from oblivious switching2021-12-21Paper
Fast optimistically fair cut-and-choose 2PC
Financial Cryptography and Data Security
2021-04-07Paper
Non-interactive zero-knowledge proofs for composite statements2020-06-30Paper
Non-interactive secure 2PC in the offline/online and batch settings
Lecture Notes in Computer Science
2017-06-23Paper
Sublinear zero-knowledge arguments for RAM programs
Lecture Notes in Computer Science
2017-06-13Paper
\textbf{TWORAM:} efficient oblivious RAM in two rounds with applications to searchable encryption
Advances in Cryptology – CRYPTO 2016
2016-11-09Paper
Efficient zero-knowledge proof of algebraic and non-algebraic statements with applications to privacy preserving credentials
Advances in Cryptology – CRYPTO 2016
2016-11-09Paper
Rate-limited secure function evaluation
Theoretical Computer Science
2016-10-21Paper
Efficient zero-knowledge proofs of non-algebraic statements with sublinear amortized cost
Lecture Notes in Computer Science
2015-12-10Paper
How to efficiently evaluate RAM programs with malicious security
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Richer Efficiency/Security Trade-offs in 2PC
Theory of Cryptography
2015-07-06Paper
Actively Secure Private Function Evaluation
Lecture Notes in Computer Science
2015-01-06Paper
Flexor: Flexible garbling for XOR gates that beats free-XOR
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Non-interactive secure computation based on cut-and-choose
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Enhanced chosen-ciphertext security and applications
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Garbled circuits checking garbled circuits: more efficient and secure two-party computation
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Efficient multiparty computation for arithmetic circuits against a covert majority
Progress in Cryptology – AFRICACRYPT 2013
2013-06-07Paper
How to hide circuits in MPC an efficient framework for private function evaluation
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Rate-limited secure function evaluation: definitions and constructions
Public-Key Cryptography – PKC 2013
2013-04-19Paper
An efficient protocol for oblivious DFA evaluation and applications
Lecture Notes in Computer Science
2012-06-08Paper
One-time signatures and chameleon hash functions
Selected Areas in Cryptography
2011-03-15Paper
A Closer Look at Anonymity and Robustness in Encryption Schemes
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Efficient and Secure Evaluation of Multivariate Polynomials and Applications
Applied Cryptography and Network Security
2010-07-06Paper
Adaptive trapdoor functions and chosen-ciphertext security
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Communication-Efficient Private Protocols for Longest Common Subsequence
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries
Lecture Notes in Computer Science
2009-02-10Paper
Multi-party Indirect Indexing and Applications
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
Improved Efficiency for Private Stable Matching
Lecture Notes in Computer Science
2008-04-17Paper
Constant-Round Private Database Queries
Automata, Languages and Programming
2007-11-28Paper
Secure Linear Algebra Using Linearly Recurrent Sequences
Theory of Cryptography
2007-08-30Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper


Research outcomes over time


This page was built for person: Payman Mohassel