| Publication | Date of Publication | Type |
|---|
| Row reduction techniques for \(n\)-party garbling | 2026-02-04 | Paper |
| Shorter, tighter, FAESTer: optimizations and improved (QROM) analysis for VOLE-in-the-head signatures | 2026-01-28 | Paper |
| Black-box (and fast) non-malleable zero knowledge | 2024-12-13 | Paper |
| MPC with delayed parties over star-like networks | 2024-08-30 | Paper |
| ZK-for-Z2K: MPC-in-the-head zero-knowledge proofs for \(\mathbb{Z}_{2^k}\) | 2024-08-30 | Paper |
Scooby: improved multi-party homomorphic secret sharing based on FHE Information and Computation | 2024-03-27 | Paper |
Publicly verifiable zero-knowledge and post-quantum signatures from VOLE-in-the-head Advances in Cryptology – CRYPTO 2023 | 2024-02-06 | Paper |
Four-round black-box non-malleable schemes from one-way permutations Theory of Cryptography | 2023-08-14 | Paper |
Scooby: improved multi-party homomorphic secret sharing based on FHE Lecture Notes in Computer Science | 2023-07-25 | Paper |
Efficient proof of RAM programs from any public-coin zero-knowledge system Lecture Notes in Computer Science | 2023-07-25 | Paper |
| Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT | 2023-03-22 | Paper |
| Efficient constant-round MPC with identifiable abort and public verifiability | 2022-11-09 | Paper |
| Tightly secure ring-LWE based key encapsulation with short ciphertexts | 2022-08-25 | Paper |
| Faster secure multi-party computation of AES and DES using lookup tables | 2022-07-01 | Paper |
TinyKeys: a new approach to efficient multi-party computation Journal of Cryptology | 2022-04-11 | Paper |
| Banquet: short and fast signatures from AES | 2021-12-21 | Paper |
| Compilation of function representations for secure computing paradigms | 2021-12-20 | Paper |
| Large scale, actively secure computation from LPN and free-XOR garbled circuits | 2021-12-08 | Paper |
| Efficient, actively secure MPC with a dishonest majority: a survey | 2021-10-04 | Paper |
High-performance multi-party computation for binary circuits based on oblivious transfer Journal of Cryptology | 2021-08-10 | Paper |
| Overdrive2k: efficient secure MPC over \(\mathbb{Z}_{2^k}\) from somewhat homomorphic encryption | 2020-08-05 | Paper |
| BBQ: using AES in Picnic signatures | 2020-07-21 | Paper |
TinyKeys: a new approach to efficient multi-party computation Lecture Notes in Computer Science | 2020-06-30 | Paper |
| Concretely efficient large-scale MPC with active security (or tinykeys for tinyot) | 2019-01-23 | Paper |
On the Shape of the General Error Locator Polynomial for Cyclic Codes IEEE Transactions on Information Theory | 2018-09-19 | Paper |
Actively secure 1-out-of-\(N\) OT extension with application to private set intersection Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
Efficient secure multiparty computation with identifiable abort Theory of Cryptography | 2016-12-21 | Paper |
Linear overhead optimally-resilient robust MPC using preprocessing Lecture Notes in Computer Science | 2016-10-21 | Paper |
A Unified Approach to MPC with Preprocessing Using OT Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
Actively secure OT extension with optimal overhead Lecture Notes in Computer Science | 2015-12-10 | Paper |
Bootstrapping BGV ciphertexts with a wider choice of \(p\) and \(q\) Lecture Notes in Computer Science | 2015-08-27 | Paper |
Dishonest majority multi-party computation for binary circuits Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Between a rock and a hard place: interpolating between MPC and FHE Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Improved decoding of affine-variety codes Journal of Pure and Applied Algebra | 2012-10-19 | Paper |
Computing the distance distribution of systematic nonlinear codes Journal of Algebra and its Applications | 2010-05-21 | Paper |
Decoding cyclic codes: the Cooper philosophy Gröbner Bases, Coding, and Cryptography | 2009-12-16 | Paper |
An introduction to linear and cyclic codes Gröbner Bases, Coding, and Cryptography | 2009-12-16 | Paper |
Gröbner bases for the distance distribution of systematic codes Gröbner Bases, Coding, and Cryptography | 2009-12-16 | Paper |
Invited Talk: Decoding Cyclic Codes: The Cooper Philosophy Mathematical Methods in Computer Science | 2009-01-22 | Paper |
General Error Locator Polynomials for Binary Cyclic Codes With <formula formulatype="inline"><tex>$t \le 2$</tex></formula> and <formula formulatype="inline"> <tex>$n < 63$</tex></formula> IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Correcting errors and erasures via the syndrome variety Journal of Pure and Applied Algebra | 2005-06-23 | Paper |