| Publication | Date of Publication | Type |
|---|
| Compressing unit-vector correlations via sparse pseudorandom generators | 2024-12-13 | Paper |
| Information-theoretic distributed point functions | 2024-06-25 | Paper |
scientific article; zbMATH DE number 7829259 (Why is no real title available?) (available as arXiv preprint) | 2024-04-09 | Paper |
Arithmetic sketching Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Oblivious transfer with constant computational overhead Advances in Cryptology – EUROCRYPT 2023 | 2024-01-16 | Paper |
Programmable distributed point functions Advances in Cryptology – CRYPTO 2022 | 2023-07-07 | Paper |
Correlated pseudorandomness from expand-accumulate codes Advances in Cryptology – CRYPTO 2022 | 2023-06-28 | Paper |
| Generalized pseudorandom secret sharing and efficient straggler-resilient secure computation | 2023-04-13 | Paper |
| Efficient fully secure computation via distributed zero-knowledge proofs | 2023-03-29 | Paper |
| Efficient pseudorandom correlation generators from ring-LPN | 2022-11-09 | Paper |
Broadcast encryption with both temporary and permanent revocation Lecture Notes in Computer Science | 2022-11-04 | Paper |
| Secure multiparty computation with sublinear preprocessing | 2022-08-30 | Paper |
| Low-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2\)] | 2022-05-18 | Paper |
| Sublinear GMW-style compiler for MPC with preprocessing | 2022-04-22 | Paper |
| Function secret sharing for mixed-mode and fixed-point secure computation | 2021-12-08 | Paper |
| Foundations of homomorphic secret sharing | 2021-06-15 | Paper |
| Secure computation with preprocessing via function secret sharing | 2020-04-30 | Paper |
| Zero-knowledge proofs on secret-shared data via fully linear PCPs | 2020-03-09 | Paper |
| Efficient pseudorandom correlation generators: silent OT extension and more | 2020-03-09 | Paper |
Functional encryption for cascade automata (extended abstract) Lecture Notes in Computer Science | 2020-01-14 | Paper |
Accumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computation Theoretical Computer Science | 2019-10-18 | Paper |
Perennial secure multi-party computation of universal Turing machine Theoretical Computer Science | 2019-04-23 | Paper |
Functional encryption for cascade automata Information and Computation | 2017-08-08 | Paper |
Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation Lecture Notes in Computer Science | 2017-06-13 | Paper |
Breaking the circuit size barrier for secure computation under DDH Advances in Cryptology – CRYPTO 2016 | 2016-11-30 | Paper |
Function secret sharing Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
Towards efficient private distributed computation on unbounded input streams Journal of Mathematical Cryptology | 2015-08-07 | Paper |
Innovative approaches for security of small artefacts Computer Science Review | 2014-10-24 | Paper |
Distributed Point Functions and Their Applications Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
| scientific article; zbMATH DE number 1559546 (Why is no real title available?) | 2001-02-28 | Paper |
| scientific article; zbMATH DE number 1418319 (Why is no real title available?) | 2000-07-19 | Paper |
| scientific article; zbMATH DE number 1418291 (Why is no real title available?) | 2000-03-19 | Paper |