| Publication | Date of Publication | Type |
|---|
Achievable \textsf{CCA2} relaxation for homomorphic encryption Journal of Cryptology | 2024-12-27 | Paper |
Weighted secret sharing from wiretap channels | 2024-11-22 | Paper |
SPRINT: high-throughput robust distributed Schnorr signatures | 2024-11-13 | Paper |
Security with functional re-encryption from CPA | 2024-08-02 | Paper |
Additive randomized encodings and their applications Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Random-index oblivious RAM Theory of Cryptography | 2023-08-14 | Paper |
Achievable \textsf{CCA2} relaxation for homomorphic encryption Theory of Cryptography | 2023-08-14 | Paper |
Generalized pseudorandom secret sharing and efficient straggler-resilient secure computation | 2023-04-13 | Paper |
Random-index PIR and applications | 2023-04-13 | Paper |
Homomorphic Encryption Standard Protecting Privacy through Homomorphic Encryption | 2022-11-02 | Paper |
Practical non-interactive publicly verifiable secret sharing with thousands of parties | 2022-08-30 | Paper |
YOSO: You only speak once. Secure MPC with stateless ephemeral roles | 2022-04-22 | Paper |
Homomorphic encryption Tutorials on the Foundations of Cryptography | 2022-01-12 | Paper |
Can a public blockchain keep a secret? | 2021-12-01 | Paper |
Round-optimal secure multi-party computation Journal of Cryptology | 2021-07-30 | Paper |
Bootstrapping for helib Journal of Cryptology | 2021-04-07 | Paper |
Homomorphic encryption for finite automata | 2020-05-05 | Paper |
On fully secure MPC with solitary output | 2020-04-30 | Paper |
Compressible FHE with applications to PIR | 2020-04-30 | Paper |
An improved RNS variant of the BFV homomorphic encryption scheme | 2020-01-28 | Paper |
Best possible information-theoretic MPC | 2018-12-06 | Paper |
Round-optimal secure multi-party computation Lecture Notes in Computer Science | 2018-09-26 | Paper |
Faster homomorphic linear transformations in HElib | 2018-09-12 | Paper |
MMH: Software message authentication in the Gbit/second rates Fast Software Encryption | 2018-05-09 | Paper |
Non-interactive multiparty computation without correlated randomness | 2018-02-23 | Paper |
Four round secure computation without setup | 2018-01-19 | Paper |
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input Algorithmica | 2018-01-05 | Paper |
Potential function analysis of greedy hot-potato routing Proceedings of the thirteenth annual ACM symposium on Principles of distributed computing - PODC '94 | 2017-09-29 | Paper |
Maintaining authenticated communication in the presence of break-ins Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing - PODC '97 | 2017-09-29 | Paper |
Cryptanalyses of Candidate Branching Program Obfuscators Lecture Notes in Computer Science | 2017-06-23 | Paper |
Spooky Encryption and Its Applications Advances in Cryptology – CRYPTO 2016 | 2016-11-09 | Paper |
Candidate indistinguishability obfuscation and functional encryption for all circuits SIAM Journal on Computing | 2016-07-04 | Paper |
Secure multiparty computation with general interaction patterns Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science | 2016-04-15 | Paper |
Functional encryption without obfuscation Theory of Cryptography | 2016-04-08 | Paper |
Private database access with HE-over-ORAM architecture Applied Cryptography and Network Security | 2016-03-10 | Paper |
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations Lecture Notes in Computer Science | 2015-12-10 | Paper |
Practical and provably-secure commitment schemes from collision-free hashing Advances in Cryptology — CRYPTO ’96 | 2015-11-11 | Paper |
Bootstrapping for HElib Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
Graph-induced multilinear maps from lattices Theory of Cryptography | 2015-07-06 | Paper |
Clock synchronization with faults and recoveries (extended abstract) Proceedings of the nineteenth annual ACM symposium on Principles of distributed computing | 2015-03-03 | Paper |
Private approximation of NP-hard functions Proceedings of the thirty-third annual ACM symposium on Theory of computing | 2015-02-27 | Paper |
Optimizing ORAM and Using It Efficiently for Secure Computation Privacy Enhancing Technologies | 2014-08-19 | Paper |
Algorithms in HElib Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science | 2014-07-30 | Paper |
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Garbled RAM revisited Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Two-round secure MPC from indistinguishability obfuscation Theory of Cryptography | 2014-02-18 | Paper |
Private database queries using somewhat homomorphic encryption Applied Cryptography and Network Security | 2014-01-24 | Paper |
Discrete Gaussian leftover hash lemma over infinite domains Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Attribute-based encryption for circuits from multilinear maps Advances in Cryptology – CRYPTO 2013 | 2013-09-17 | Paper |
Candidate Multilinear Maps from Ideal Lattices Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Packed ciphertexts in LWE-based homomorphic encryption Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Ring switching in BGV-style homomorphic encryption Lecture Notes in Computer Science | 2012-09-25 | Paper |
Homomorphic evaluation of the AES circuit Lecture Notes in Computer Science | 2012-09-25 | Paper |
Better bootstrapping in fully homomorphic encryption Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Fully homomorphic encryption with polylog overhead Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Leakage-Tolerant Interactive Protocols Theory of Cryptography | 2012-06-15 | Paper |
Smooth projective hashing and two-message oblivious transfer Journal of Cryptology | 2012-05-23 | Paper |
Program obfuscation with leaky hardware Lecture Notes in Computer Science | 2011-12-02 | Paper |
Collision-free hashing from lattice problems Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation | 2011-08-19 | Paper |
Secure computation on the web: computing without simultaneous interaction Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
Implementing Gentry's fully-homomorphic encryption scheme Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
After-the-fact leakage in public-key encryption Theory of Cryptography | 2011-05-19 | Paper |
One-pass HMQV and asymmetric key-wrapping Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
The random oracle methodology, revisited. Journal of the ACM | 2011-02-01 | Paper |
\(i\)-hop homomorphic encryption and rerandomizable Yao circuits Advances in Cryptology – CRYPTO 2010 | 2010-08-24 | Paper |
Fully homomorphic encryption over the integers Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
A simple BGN-type cryptosystem from LWE Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
More on key wrapping Selected Areas in Cryptography | 2009-12-09 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2009-05-14 | Paper |
Topics in Cryptology – CT-RSA 2004 Lecture Notes in Computer Science | 2009-05-07 | Paper |
Invertible Universal Hashing and the TET Encryption Mode Advances in Cryptology - CRYPTO 2007 | 2009-03-10 | Paper |
Hierarchical Identity Based Encryption with Polynomially Many Levels Theory of Cryptography | 2009-03-03 | Paper |
Circular-Secure Encryption from Decision Diffie-Hellman Lecture Notes in Computer Science | 2009-02-10 | Paper |
Universally Composable Password-Based Key Exchange Lecture Notes in Computer Science | 2008-05-06 | Paper |
Cryptanalysis of ISO/IEC 9796-1 Journal of Cryptology | 2008-04-16 | Paper |
Threshold RSA for Dynamic and Ad-Hoc Groups Advances in Cryptology – EUROCRYPT 2008 | 2008-04-15 | Paper |
On Seed-Incompressible Functions Theory of Cryptography | 2008-03-05 | Paper |
Degradation and Amplification of Computational Hardness Theory of Cryptography | 2008-03-05 | Paper |
Advances in Cryptology - CRYPTO 2003 Lecture Notes in Computer Science | 2007-11-28 | Paper |
Chosen‐Ciphertext Security from Identity‐Based Encryption SIAM Journal on Computing | 2007-10-22 | Paper |
Advances in Cryptology - EUROCRYPT 2004 Lecture Notes in Computer Science | 2007-09-25 | Paper |
Strengthening Digital Signatures Via Randomized Hashing Lecture Notes in Computer Science | 2007-09-04 | Paper |
Mitigating Dictionary Attacks on Password-Protected Local Storage Lecture Notes in Computer Science | 2007-09-04 | Paper |
A forward-secure public-key encryption scheme Journal of Cryptology | 2007-08-20 | Paper |
Topics in Cryptology – CT-RSA 2006 Lecture Notes in Computer Science | 2007-02-12 | Paper |
Exposure-resilient functions and all-or-nothing transforms | 2006-03-01 | Paper |
Computing inverses over a shared secret modulus | 2006-03-01 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2005-12-07 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2005-12-07 | Paper |
scientific article; zbMATH DE number 2089137 (Why is no real title available?) | 2004-08-12 | Paper |
scientific article; zbMATH DE number 2081057 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 2009960 (Why is no real title available?) | 2003-11-26 | Paper |
scientific article; zbMATH DE number 1942441 (Why is no real title available?) | 2003-06-30 | Paper |
scientific article; zbMATH DE number 1848287 (Why is no real title available?) | 2003-02-04 | Paper |
scientific article; zbMATH DE number 1775406 (Why is no real title available?) | 2002-09-24 | Paper |
scientific article; zbMATH DE number 1759774 (Why is no real title available?) | 2002-07-28 | Paper |
scientific article; zbMATH DE number 1418297 (Why is no real title available?) | 2000-07-26 | Paper |
Efficient commitment schemes with bounded sender and unbounded receiver Journal of Cryptology | 2000-05-22 | Paper |
Maintaining authenticated communication in the presence of break-ins Journal of Cryptology | 2000-05-08 | Paper |
scientific article; zbMATH DE number 1302853 (Why is no real title available?) | 1999-06-17 | Paper |
Secure Hash-and-Sign Signatures Without the Random Oracle Advances in Cryptology — EUROCRYPT ’99 | 1999-01-01 | Paper |
Potential function analysis of greedy hot-potato routing Theory of Computing Systems | 1998-08-03 | Paper |
scientific article; zbMATH DE number 1088230 (Why is no real title available?) | 1998-06-25 | Paper |
scientific article; zbMATH DE number 1088229 (Why is no real title available?) | 1998-01-07 | Paper |
scientific article; zbMATH DE number 1030983 (Why is no real title available?) | 1997-11-23 | Paper |